Audit & Pentesting

Measure the security level of your information system

Whatever your constraints or challenges, our team puts its technical expertise at your service to establish an inventory of the level of protection of your sensitive data.

Why perform penetration tests?

Direct consequences

  • Knowledge of the real level of security of the IS.
  • Indispensable complement to the security audit.
  • Complement to the recurring and automated vulnerability audit.
  • Checking for configuration errors.

Indirect consequences

  • Improved security.
  • Awareness of IT security.
  • Improved responsiveness of security teams.
  • Improvement of intrusion detection systems.

Different types of services offered by our experts

Internal penetration test

This test involves performing the attack directly on the internal corporate network.

Configuration audit

Confronts the level of security of a given environment with the state of the art in terms of security.

External intrusion test

This test aims to assess the resistance of infrastructures to an attack carried out from the Internet.

Source code audit

Allows near exhaustive detection of vulnerabilities in an application.

Wifi intrusion test

This test is used to assess the resilience of the wireless infrastructure to attacks.

Architecture audit

Complete and technical audit of the information system architecture.

Methods used:

Our teams simulate an attack by a malicious user or malware to assess the level of security of your IS. For this, we differentiate three situations:

  • Our team puts themselves in the shoes of a potential attacker
  • Our team has a limited amount of information
  • Our team has all the necessary information

We use all known and unknown attack methods developed by our experts: OWASP, OSSTMM, ISC², ISACA, GIAC, Offensive Security. Our consultants are certified: CEH, OSCP, OSCE and participate in many CTFs

The 4 stages of our intervention

Definition of the scope
Choice of test type
Penetration tests
Audit report

Our expert consultants are at your disposal to discuss your needs and your projects for your information system.

Ce site utilise des cookies et demande vos données personnelles pour améliorer votre expérience de navigation.