INFRASTRUCTURAL
SECURITY

INFORMATION GATHERING

Manual or automated scanning phase in order to identify vulnerabilities that allow the attacker to breach systems. Jpic in this phase is responsible for classifying the vulnerabilities found through the tools and verifying that it is not a false positive. The vulnerabilities we identify are about:

ACTIVE

PASSIVE

VULNERABILITY ASSESSMENT

Manual or automated scanning phase in order to identify vulnerabilities that allow the attacker to breach systems. Jpic in this phase is responsible for classifying the vulnerabilities found through the tools and verifying that it is not a false positive. The vulnerabilities we identify are about:

EXPLOITATION

In this phase, vulnerabilities are exploited to make one to or more accesses to the victim machine. In this case, a series of tools are used that allow us to carry out attacks. It is at this point that the experience of the penetration tester and the methodology used play an important role. The penetration tester acts as a real attacker, attempting to circumvent the defenses adopted for the target defined by the client. At this stage, the tester may also identify new vulnerabilities and code exploits.

POSTEXPLOITATION

Manual or automated scanning phase in order to identify vulnerabilities that allow the attacker to breach systems. Jpic in this phase is responsible for classifying the vulnerabilities found through the tools and verifying that it is not a false positive. The vulnerabilities we identify are about:

ACCESS MANTEINANCE

In wich the connection to the machine is established at the desired time.

PRIVILEGE ESCALATION

In wich it attempts to become an administrator of the machine.

REPORT

SUMMARY
AND SYNTHESIS

Presentation of the general report on activities carried out to stakeholders containing in general the metrics of exposed vulnerabilities

MANAGEMENT
REPORT

Presentation of a general pentester report containing the life cycle, duration, modes , best-practies, framework, and impacts of attacks on the target system.

TECHNICAL
REPORT

Presentation of a pentester's technical report containing items regarding the main tools and instruments used to carry out an attack on the system.

E-mail: info@jpic.it

Phone Number: +39 335 1740296

VAT Number: 11902590964