Services - Penetration Testing

They are a safety assessment performed exactly as you would a real attacker, ie, vulnerabilities are discovered and exploits are launched attempting to gain unauthorized access, modification packet, denial of service, etc., coming down to the critical point.; the goal is to inform the institution or business assets, the possible consequences in case of not having the necessary security measures, adding elements for decision-making in security strategy.

The vulnerability scanning to identify weaknesses in the target system, builds on the details obtained during the previous phases, the goal is to identify the most effective method of attack and provide the type of information that will be obtained when the found vulnerability is exploited. You should take the same approach it would take a real attacker, see the organization as a potential adversary and try to cause the most damage.