Stages of pen testing design:<\/strong><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=”stretch_row” css=”.vc_custom_1643384939640{padding-top: 3rem !important;padding-bottom: 1.5rem !important;}”][vc_row equal_height=”yes” css=”.vc_custom_1642784511187{margin-bottom: 3rem !important;}”][vc_column width=”5\/12″][vc_custom_heading text=”Plan” font_container=”tag:h3|font_size:21px|text_align:right|line_height:1.2″ use_theme_fonts=”yes” el_class=”text-xs-center”][vc_custom_heading text=”Explore scope and goals of project.” font_container=”tag:p|font_size:18px|text_align:right|line_height:1.6″ use_theme_fonts=”yes” el_class=”text-xs-center”][\/vc_column][vc_column width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”771″ img_size=”12×156″ alignment=”center” css=”.vc_custom_1642784418134{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”][\/vc_column][vc_column width=”5\/12″ css=”.vc_custom_1642785506179{margin-bottom: 3rem !important;}”][vc_icon icon_fontawesome=”fas fa-edit” color=”sky” size=”xl”][\/vc_column][\/vc_row][vc_row equal_height=”yes” css=”.vc_custom_1642785310514{margin-bottom: 3rem !important;}” el_class=”reverse-md reverse-lg”][vc_column width=”5\/12″][vc_custom_heading text=”Reconnaissance” font_container=”tag:h3|font_size:21px|text_align:left|line_height:1.2″ use_theme_fonts=”yes” el_class=”text-xs-center”][vc_custom_heading text=”Gather information on business and map out attacks and access.” font_container=”tag:p|font_size:18px|text_align:left|line_height:1.6″ use_theme_fonts=”yes” el_class=”text-xs-center”][\/vc_column][vc_column width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”772″ img_size=”12×156″ alignment=”center” css=”.vc_custom_1642784447437{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”][\/vc_column][vc_column width=”5\/12″ css=”.vc_custom_1642785510909{margin-bottom: 3rem !important;}”][vc_icon icon_fontawesome=”fas fa-user-secret” color=”sky” size=”xl” align=”right”][\/vc_column][\/vc_row][vc_row equal_height=”yes” css=”.vc_custom_1642784520278{margin-bottom: 3rem !important;}”][vc_column width=”5\/12″][vc_custom_heading text=”Scan” font_container=”tag:h3|font_size:21px|text_align:right|line_height:1.2″ use_theme_fonts=”yes” el_class=”text-xs-center”][vc_custom_heading text=”Test scan the network\/ infrastructure for risks to determine the best entry point for attack.” font_container=”tag:p|font_size:18px|text_align:right|line_height:1.6″ use_theme_fonts=”yes” el_class=”text-xs-center”][\/vc_column][vc_column width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”771″ img_size=”12×156″ alignment=”center” css=”.vc_custom_1642784418134{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”][\/vc_column][vc_column width=”5\/12″ css=”.vc_custom_1642785514532{margin-bottom: 3rem !important;}”][vc_icon icon_fontawesome=”fas fa-search” color=”sky” size=”xl”][\/vc_column][\/vc_row][vc_row equal_height=”yes” css=”.vc_custom_1642785310514{margin-bottom: 3rem !important;}” el_class=”reverse-md reverse-lg”][vc_column width=”5\/12″][vc_custom_heading text=”Exploitation” font_container=”tag:h3|font_size:21px|text_align:left|line_height:1.2″ use_theme_fonts=”yes” el_class=”text-xs-center”][vc_custom_heading text=”Penetrate\/ Compromise the system and network and obtain as much information as possible.” font_container=”tag:p|font_size:18px|text_align:left|line_height:1.6″ use_theme_fonts=”yes” el_class=”text-xs-center”][\/vc_column][vc_column width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”772″ img_size=”12×156″ alignment=”center” css=”.vc_custom_1642784447437{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”][\/vc_column][vc_column width=”5\/12″ css=”.vc_custom_1642785510909{margin-bottom: 3rem !important;}”][vc_icon icon_fontawesome=”fas fa-info-circle” color=”sky” size=”xl” align=”right”][\/vc_column][\/vc_row][vc_row equal_height=”yes” css=”.vc_custom_1642784520278{margin-bottom: 3rem !important;}”][vc_column width=”5\/12″][vc_custom_heading text=”Reporting” font_container=”tag:h3|font_size:21px|text_align:right|line_height:1.2″ use_theme_fonts=”yes” el_class=”text-xs-center”][vc_custom_heading text=”Create a detailed report outlining step by step how the pen test was performed, what data was retrieved, what weaknesses were found and recommendations for improvement and remediation.” font_container=”tag:p|font_size:18px|text_align:right|line_height:1.6″ use_theme_fonts=”yes” el_class=”text-xs-center”][\/vc_column][vc_column width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”771″ img_size=”12×156″ alignment=”center” css=”.vc_custom_1642784418134{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”][\/vc_column][vc_column width=”5\/12″ css=”.vc_custom_1642785514532{margin-bottom: 3rem !important;}”][vc_icon icon_fontawesome=”fas fa-edit” color=”sky” size=”xl”][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1641827036826{margin-top: 1.5rem !important;}”][vc_column][vc_column_text]<\/p>\n
Pen testing can reveal how a hacker can attack and exploit a vulnerable network and device.<\/b><\/p>\n
[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=”stretch_row” css=”.vc_custom_1641827793573{padding-top: 3rem !important;padding-bottom: 1.5rem !important;background-color: #e7f4fc !important;}” el_id=”types-of-a-pen-test”][vc_row content_placement=”middle”][vc_column css=”.vc_custom_1641827882761{margin-bottom: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”TAILORED PEN TESTS AND IT ASSESSMENTS” font_container=”tag:p|font_size:15px|text_align:center|color:%23018ad2″ use_theme_fonts=”yes” el_class=”text-uppercase font-weight-bold”][vc_custom_heading text=”TYPES OF PEN TESTING” font_container=”tag:h2|text_align:center” use_theme_fonts=”yes” el_class=”text-uppercase”][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1641827890072{margin-top: 1.5rem !important;padding-top: 0px !important;}”][vc_column width=”1\/5″][vc_custom_heading text=”INTERNAL NETWORK” font_container=”tag:p|text_align:center|color:%23018ad2″ use_theme_fonts=”yes” el_class=”text-transform h5″][\/vc_column][vc_column width=”1\/5″][vc_custom_heading text=”EXTERNAL NETWORK” font_container=”tag:p|text_align:center|color:%23018ad2″ use_theme_fonts=”yes” el_class=”text-transform h5″][\/vc_column][vc_column width=”1\/5″][vc_custom_heading text=”WEB APPLICATIONS” font_container=”tag:p|text_align:center|color:%23018ad2″ use_theme_fonts=”yes” el_class=”text-transform h5″][\/vc_column][vc_column width=”1\/5″][vc_custom_heading text=”WI-FI TEST” font_container=”tag:p|text_align:center|color:%23018ad2″ use_theme_fonts=”yes” el_class=”text-transform h5″][\/vc_column][vc_column width=”1\/5″][vc_custom_heading text=”CLOUD CONFIGURATION REVIEW” font_container=”tag:p|text_align:center|color:%23018ad2″ use_theme_fonts=”yes” el_class=”text-transform h5″][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1641827036826{margin-top: 1.5rem !important;}”][vc_column][vc_column_text]<\/p>\n
Which type of pen test is right for me?<\/b><\/h3>\n
The scope of a pen test depends on your testing requirements. We tailor our pen tests and IT assessments to meet your objectives, based on the reason for your pen test and the size of your infrastructure. To discuss your requirements or for any advice on pen testing, contact our friendly team.<\/p>\n
[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_btn title=”TALK TO ONE OF OUR SPECIALISTS” style=”custom” custom_background=”#018ad2″ custom_text=”#ffffff” size=”lg” align=”center” link=”url:%2Fcontact%2F” el_class=”text-uppercase font-weight-bold”][\/vc_column][\/vc_row][\/vc_section][vc_row][vc_column][vc_section full_width=”stretch_row” content_placement=”middle” css=”.vc_custom_1642783577012{padding-top: 3rem !important;padding-bottom: 3rem !important;background-color: #018ad2 !important;}”][vc_row][vc_column][vc_custom_heading text=”GET IN TOUCH WITH US” font_container=”tag:h5|font_size:38px|text_align:center|color:%23ffffff|line_height:1.2″ use_theme_fonts=”yes”][vc_custom_heading text=”Get the help you need 24\/7 – We\u2019re here for you every step of the way” font_container=”tag:p|font_size:18px|text_align:center|color:%23ffffff|line_height:1.6″ use_theme_fonts=”yes”][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1642783584780{margin-top: 1.5rem !important;}”][vc_column width=”1\/3″][vc_icon icon_fontawesome=”fas fa-phone” color=”white” size=”lg” align=”center” css=”.vc_custom_1642783776778{margin-bottom: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”Call our experts” font_container=”tag:p|font_size:22px|text_align:center|color:%23ffffff|line_height:1.6″ use_theme_fonts=”yes” css=”.vc_custom_1642783121152{margin-bottom: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”0121 3888 999″ font_container=”tag:p|font_size:22px|text_align:center|color:%23ffffff|line_height:1.6″ use_theme_fonts=”yes” css=”.vc_custom_1642783821120{margin-top: -.5rem !important;margin-bottom: 0px !important;padding-bottom: 0px !important;}” el_class=”fw600″][\/vc_column][vc_column width=”1\/3″][vc_icon icon_fontawesome=”fas fa-envelope-open-text” color=”white” size=”lg” align=”center” css=”.vc_custom_1642783772418{margin-bottom: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”Email us” font_container=”tag:p|font_size:22px|text_align:center|color:%23ffffff|line_height:1.6″ use_theme_fonts=”yes” css=”.vc_custom_1642783207555{margin-bottom: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”enquiries@moremicro.com” font_container=”tag:p|font_size:22px|text_align:center|color:%23ffffff|line_height:1.6″ use_theme_fonts=”yes” css=”.vc_custom_1642783817688{margin-top: -.5rem !important;margin-bottom: 0px !important;padding-bottom: 0px !important;}” el_class=”fw600″ link=”url:mailto%3Ainfo%40moremicro.com”][\/vc_column][vc_column width=”1\/3″][vc_icon icon_fontawesome=”fas fa-headset” color=”white” size=”lg” align=”center” css=”.vc_custom_1642783768067{margin-bottom: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”Contact us online” font_container=”tag:p|font_size:22px|text_align:center|color:%23ffffff|line_height:1.6″ use_theme_fonts=”yes” css=”.vc_custom_1642783429464{margin-bottom: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”Send us an Enquiry” font_container=”tag:p|font_size:22px|text_align:center|color:%23ffffff|line_height:1.6″ use_theme_fonts=”yes” css=”.vc_custom_1642783814464{margin-top: -.5rem !important;margin-bottom: 0px !important;padding-bottom: 0px !important;}” el_class=”fw600″ link=”url:%2Fcontact%2F”][\/vc_column][\/vc_row][\/vc_section]