Network security audit (from the Internet)
- Attempt to take over systems available directly from the Internet
- An attempt to penetrate from the Internet to the internal LAN
- Basic attacks on web applications made available to customers in order to take control over them or bypass authorization
- Data theft
- Reconnaissance of public IP addresses Client
- Reconnaissance of public web applications and customer services (including those “hidden”)
- Searching for relevant, technical information about a customer available to the public (OSINT)
- Searching for vulnerabilities in shared network services
- Taking control of services / servers and attempting to escalate inside the network
Scroll to top