Now more than ever, it is imperative to keep your information systems updated and hardened to withstand the random or persistent attacks launched against your technological infrastructure. Testing from different vectors and at varying intensities is necessary.
Vulnerability Analysis
Identify services and applications with problems such as:
Known faults (CVE, manufacturer and community reports).
Default or faulty configurations.
Penetration tests
Check if the vulnerabilities can be exploited
Use of exploits
Impersonation
Network listening
Social engineering
Testing the human factor
Web application analysis
Detecting security flaws in code
Testing against the OWASP Top 10 database
