Penetration testing (also called as “Pen-Test”), is a type of simulated ethical cyberattack on IT assets such as computer system, server, network, API, or application etc. to discover and exploit security vulnerabilities before hackers find and utilize these vulnerabilities to launch malicious attacks.
Types of Pen-Tests
Black Box
Pen-Test without prior knowledge or granted access to the target assets.
Grey Box
Pen-Test with limited knowledge or limited access to the target assets.
White Box
Pen-Test with full knowledge and access to target IT assets.
Penetration Test Targets
Web Application
Mobile Application
Desktop Application
Wechat Mini Program
Network (Internal & External)
Wireless SSID / WiFi
Message Queue
API, FIX Adaptor etc.
Our Strength
Attacker's mindset, defender's insight - we simulate real cyberattacks to exploit security vulnerabilities
We take compliance into consideration in pen-test such as PDPA & HIPAA.
Business logic security loophole exploitation - we evaluate business logic security loopholes and risk impact.
Full support for remediation - we help stakeholders to fully understand detected target assets' risk exposure and provide tech support to remediate vulnerabilities.
1
Strong Track Record
2
Certified Ethical Pen-Testers
3
More than 8 years' experience
4
Rich industry experience (financial, banking, airport, fin-tech, blockchain, healthcare etc.)
Standard Adherence
At Cyber Shield, our Penetration testing (Pen-Test) service adheres to these standards