{"id":47664,"date":"2021-07-19T10:03:14","date_gmt":"2021-07-19T09:03:14","guid":{"rendered":"https:\/\/cyberant.com\/pentest-2\/"},"modified":"2024-08-13T16:02:01","modified_gmt":"2024-08-13T14:02:01","slug":"pen_test","status":"publish","type":"page","link":"https:\/\/cyberant.com\/en\/pen_test\/","title":{"rendered":"Pentest"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1a7v96ic-5fe70eeb311d160924c0b3d212c2c64c\">\n.avia-section.av-1a7v96ic-5fe70eeb311d160924c0b3d212c2c64c{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2024\/03\/teamwork-laptop-pentest-CA1-1500x630.jpg);\nbackground-position:50% 50%;\nbackground-attachment:fixed;\n}\n.avia-section.av-1a7v96ic-5fe70eeb311d160924c0b3d212c2c64c .av-section-color-overlay{\nopacity:0.3;\nbackground-color:#ef8f45;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-1a7v96ic-5fe70eeb311d160924c0b3d212c2c64c main_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-fixed av-section-color-overlay-active av-minimum-height av-minimum-height-25 av-height-25  container_wrap sidebar_right'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47664'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-1ujaizs-11c5a4e397003fc35466e23f24912210 sc-av_one_half av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1ujaizs-11c5a4e397003fc35466e23f24912210\">\n.flex_column.av-1ujaizs-11c5a4e397003fc35466e23f24912210{\npadding:40px 40px 40px 40px;\nbackground-color:#fcfcfc;\n}\n<\/style>\n<div  class='flex_column av-1ujaizs-11c5a4e397003fc35466e23f24912210 av_one_half  avia-builder-el-1  el_before_av_one_half  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-top  '     ><section  class='av_textblock_section av-l9prgap3-2784efe24f9167578a0ba6d1f5eae14a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Pentesting with CyberAnt<\/h2>\n<p>Is your business safe? Even when a hacker tries really hard?<\/p>\n<p>With CyberAnt&#8217;s pentest, you can be sure that your (web) application, website, IT infrastructure, APIs or mobile apps do not contain any vulnerabilities. Our ethical hackers are happy to help you secure what is important to your situation.<\/p>\n<p>Each pentest is different, but the process is often the same. Read more about our approach below, or contact us for an introductory meeting.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lezorq8b-4b5fafcfcf4926d965f3f9f188108716-wrap avia-button-left  avia-builder-el-3  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezorq8b-4b5fafcfcf4926d965f3f9f188108716\">\n#top #wrap_all .avia-button.av-lezorq8b-4b5fafcfcf4926d965f3f9f188108716{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-lezorq8b-4b5fafcfcf4926d965f3f9f188108716:hover{\nbackground-color:#222222;\ncolor:white;\nopacity:1;\ntransition:all 0.4s ease-in-out;\n}\n<\/style>\n<a href='https:\/\/cyberant.com\/en\/contact\/'  class='avia-button av-lezorq8b-4b5fafcfcf4926d965f3f9f188108716 av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Requesting Pentest\"><span class='avia_iconbox_title' >Requesting Pentest<\/span><span class='avia_button_icon avia_button_icon_right' aria-hidden='true' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello'><\/span><\/a><\/div><\/p><\/div><div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ey2pk-29393a918d17e1dbf2751be1da4a725e\">\n.flex_column.av-6ey2pk-29393a918d17e1dbf2751be1da4a725e{\npadding:20px 40px 20px 40px;\nbackground-color:#333333;\n}\n<\/style>\n<div  class='flex_column av-6ey2pk-29393a918d17e1dbf2751be1da4a725e av_one_half  avia-builder-el-4  el_after_av_one_half  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-79dyvc-81902dd4f2c23f44c7bae603b9a9c06a\">\n@keyframes av_sonarEffect_av-79dyvc-81902dd4f2c23f44c7bae603b9a9c06a {\n  0% {opacity: 0.3;}\n 40% {opacity: 0.5; box-shadow: 0 0 0 2px rgba(255,255,255,0.1), 0 0 10px 10px #ffffff, 0 0 0 10px rgba(255,255,255,0.5);}\n100% {opacity: 0; box-shadow: 0 0 0 2px rgba(255,255,255,0.1), 0 0 10px 10px #ffffff, 0 0 0 10px rgba(255,255,255,0.5); transform: scale(1.5);}\n}\n#top .avia-animated-number.av-79dyvc-81902dd4f2c23f44c7bae603b9a9c06a .avia-animated-number-title{\nfont-size:60px;\ncolor:#55bfa8;\n}\n#top .avia-animated-number.av-79dyvc-81902dd4f2c23f44c7bae603b9a9c06a .avia-animated-number-content{\ncolor:#444444;\n}\n.avia-animated-number.av-79dyvc-81902dd4f2c23f44c7bae603b9a9c06a .avia-animated-number-circle-inner{\nborder-style:none;\nbox-shadow:none;\n}\n.avia-animated-number.av-79dyvc-81902dd4f2c23f44c7bae603b9a9c06a.avia-sonar-shadow:hover .avia-animated-number-circle-inner:after{\nanimation:av_sonarEffect_av-79dyvc-81902dd4f2c23f44c7bae603b9a9c06a 1s ease-in-out;\n}\n<\/style>\n<div  class=\"avia-animated-number av-79dyvc-81902dd4f2c23f44c7bae603b9a9c06a av-force-default-color avia_animate_when_visible  avia-builder-el-5  el_before_av_hr  avia-builder-el-first  avia-color-font-custom avia-sonar-shadow \" data-timer=\"3000\"><strong class=\"heading avia-animated-number-title\"><span class=\"avia-single-number __av-single-number\" data-number_format=\".\" data-number=\"439\" data-start_from=\"0\">439<\/span><span class='avia-animated-number-icon av-icon-after-number av-icon-char' aria-hidden='true' data-av_icon='\ue8de' data-av_iconfont='entypo-fontello'><\/span><\/strong><div class=\"avia-animated-number-content\"><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lmrwcarh-3a1ae4483f62c75cda77568d8f1c0912\">\n#top .hr.hr-invisible.av-lmrwcarh-3a1ae4483f62c75cda77568d8f1c0912{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-lmrwcarh-3a1ae4483f62c75cda77568d8f1c0912 hr-invisible  avia-builder-el-6  el_after_av_animated_numbers  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1yelbeg-e64900f8ae50a6d82cd24952d93c45e1\">\n#top .av_textblock_section.av-1yelbeg-e64900f8ae50a6d82cd24952d93c45e1 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-1yelbeg-e64900f8ae50a6d82cd24952d93c45e1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h2 style=\"text-align: center;\">Pentests performed<\/h2>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1pt04js-4107837fcea82fb9b3c1db2d97c52871\">\n#top .hr.hr-invisible.av-1pt04js-4107837fcea82fb9b3c1db2d97c52871{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-1pt04js-4107837fcea82fb9b3c1db2d97c52871 hr-invisible  avia-builder-el-8  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l9pri38p-f75f3aa77ff1f6b567c311e7270d6acd\">\n#top .av_textblock_section.av-l9pri38p-f75f3aa77ff1f6b567c311e7270d6acd .avia_textblock{\ncolor:#ffffff;\ntext-align:left;\n}\n<\/style>\n<section  class='av_textblock_section av-l9pri38p-f75f3aa77ff1f6b567c311e7270d6acd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p>\u2713 In three steps to certainty<\/p>\n<p>\u2713 Seeing what a hacker sees<\/p>\n<p>\u2713 In-depth research with clear reporting<\/p>\n<p>\u2713 Performed by our ethical hackers<\/p>\n<p>\u2713 Understanding website and IT infrastructure vulnerabilities<\/p>\n<p>\u2713 More than 10 years of experience<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1oc0bzs-d4d04aa429b5367c632ec6d7e3173687\">\n#top .hr.hr-invisible.av-1oc0bzs-d4d04aa429b5367c632ec6d7e3173687{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-1oc0bzs-d4d04aa429b5367c632ec6d7e3173687 hr-invisible  avia-builder-el-10  el_after_av_textblock  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1jouo6w-b34ededa82a9219c4edc328ff866daba\">\n.avia-section.av-1jouo6w-b34ededa82a9219c4edc328ff866daba{\nbackground-color:#ededed;\nbackground:linear-gradient( to bottom, #ededed, #ffffff );\nmargin-top:0px;\nmargin-bottom:14px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-1jouo6w-b34ededa82a9219c4edc328ff866daba main_color avia-section-small avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47664'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzsf4469-8dce480818b514708ec52a850e111db2\">\n#top .hr.hr-invisible.av-lzsf4469-8dce480818b514708ec52a850e111db2{\nheight:70px;\n}\n<\/style>\n<div  class='hr av-lzsf4469-8dce480818b514708ec52a850e111db2 hr-invisible  avia-builder-el-12  el_before_av_one_full  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div  class='flex_column av-17pe9iw-e187cb0ab0885c9d1b001698c4c5fa63 av_one_full  avia-builder-el-13  el_after_av_hr  el_before_av_one_third  first flex_column_div  '     ><section  class='av_textblock_section av-15q66fc-1108b7d26ad39315a46cb4e59a67f6d2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\">Pentest in 3 steps<\/h2>\n<p style=\"text-align: center;\">A pentest at CyberAnt involves three steps. That way you always know where you stand.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fxou89-7bfd2ad95e5dc891f0cdc28081f30604\">\n#top .flex_column.av-2fxou89-7bfd2ad95e5dc891f0cdc28081f30604{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n.responsive #top #wrap_all .flex_column.av-2fxou89-7bfd2ad95e5dc891f0cdc28081f30604{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n<\/style>\n<div  class='flex_column av-2fxou89-7bfd2ad95e5dc891f0cdc28081f30604 av_one_third  avia-builder-el-15  el_after_av_one_full  el_before_av_one_third  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-lezq5hkp-b7d658a2a8c254c676db103188f38db0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Step 1: Inventory<\/h3>\n<p>A pentest always begins with an intake. In this we determine together what exactly is needed and what the next step looks like.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1yq30yx-0a2e43f7d78bc506d62d0076db6eb518\">\n#top .flex_column.av-1yq30yx-0a2e43f7d78bc506d62d0076db6eb518{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n.responsive #top #wrap_all .flex_column.av-1yq30yx-0a2e43f7d78bc506d62d0076db6eb518{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n<\/style>\n<div  class='flex_column av-1yq30yx-0a2e43f7d78bc506d62d0076db6eb518 av_one_third  avia-builder-el-17  el_after_av_one_third  el_before_av_one_third  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-lezq61mo-554b155ac9587a041d1230cba6472200 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Step 2: Automate<\/h3>\n<p>We believe in automation. It allows us to check for all known vulnerabilities checked in our (in-house developed) tooling without forgetting one, in a fraction of the time it would otherwise take. And the great thing is, after the pentest, you can repeat this step with little cost so you can stay on top of the security of your situation after the pentest.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1h6t495-f0fb5731484a22fb8f1898f538c1fa24\">\n#top .flex_column.av-1h6t495-f0fb5731484a22fb8f1898f538c1fa24{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n.responsive #top #wrap_all .flex_column.av-1h6t495-f0fb5731484a22fb8f1898f538c1fa24{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n<\/style>\n<div  class='flex_column av-1h6t495-f0fb5731484a22fb8f1898f538c1fa24 av_one_third  avia-builder-el-19  el_after_av_one_third  avia-builder-el-last  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-lezq65nv-9425a8a34cca8b1c49e1f10143d24760 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Step 3: Manual research<\/h3>\n<p>CyberAnt&#8217;s ethical hackers are unique in their knowledge and skills. They are able to find vulnerabilities that no one has ever found before, within any network or custom software. Because all known vulnerabilities have already been found in step 2, the security specialist can focus maximum attention on finding the new vulnerabilities that are most dangerous to your business.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3ql4gla-480db0aeee9c0b7bca3d7ef0ef894921\">\n.avia-section.av-3ql4gla-480db0aeee9c0b7bca3d7ef0ef894921{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2024\/03\/program-code-on-computer-display-in-magnifying-glas-pentest-CA2-1136x430.jpg);\nbackground-position:50% 0%;\nbackground-attachment:scroll;\nmargin-top:14px;\nmargin-bottom:14px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-3ql4gla-480db0aeee9c0b7bca3d7ef0ef894921 main_color avia-section-default avia-no-border-styling  avia-builder-el-21  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll av-minimum-height av-minimum-height-75 av-height-75  container_wrap sidebar_right'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='75' data-av_min_height_opt='75'><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47664'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-wlt3we-e184b2b286dc7dd2df51a38952c8ce54 av_one_third  avia-builder-el-22  el_before_av_two_third  avia-builder-el-first  first flex_column_div  '     ><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-428qrr2-6985f98ac8a0df3300c27ded32a23429\">\n.flex_column.av-428qrr2-6985f98ac8a0df3300c27ded32a23429{\nborder-radius:10px 10px 10px 10px;\npadding:30px 30px 30px 30px;\nbackground-color:#f4f4f4;\n}\n<\/style>\n<div  class='flex_column av-428qrr2-6985f98ac8a0df3300c27ded32a23429 av_two_third  avia-builder-el-23  el_after_av_one_third  avia-builder-el-last  flex_column_div  '     ><section  class='av_textblock_section av-3j2rise-ce7b99a8f5ab0e3b6d696f9b518976a9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>Request a free consultation now<\/h1>\n<p>A pentest is customized; our cybersecurity experts are happy to help. Fill in your information and we will contact you.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-log6rd6q-6893eb6b9cee0ca66d36b372ddca8b3d\">\n#top .av_textblock_section.av-log6rd6q-6893eb6b9cee0ca66d36b372ddca8b3d .avia_textblock{\nfont-size:23px;\n}\n<\/style>\n<section  class='av_textblock_section av-log6rd6q-6893eb6b9cee0ca66d36b372ddca8b3d '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" >\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f49426-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"49426\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/47664#wpcf7-f49426-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"49426\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f49426-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_uacf7_hidden_conditional_fields\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"uacf7-form-wrapper-container uacf7-form-49426  \"><label> Name<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label> <label> Phone number <span class=\"wpcf7-form-control-wrap\" data-name=\"tel-855\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"tel-855\" \/><\/span> <\/label> <span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-455\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-455\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I agree to the terms and conditions set forth in the <a href=\"\/en\/privacy-statement\/\">Privacy Statement*<\/a><\/span><\/label><\/span><\/span><\/span>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Submit\" \/><\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\n<\/div><\/section><\/p><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lu1d13pr-5f3ec2a44bf4c4758b48b4f1d9363802\">\n.avia-section.av-lu1d13pr-5f3ec2a44bf4c4758b48b4f1d9363802{\nmargin-top:20px;\nmargin-bottom:3px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-lu1d13pr-5f3ec2a44bf4c4758b48b4f1d9363802 main_color avia-section-default avia-no-border-styling  avia-builder-el-26  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47664'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-qj4lem-70ca92911dba2fd16e97b2612027e689 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>How does a pen test work?<\/h1>\n<p>A pentest investigation has 3 phases: blackbox, greybox and whitebox. We are happy to explain the difference.<\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1zeww1q-bfe732b473110a1237319114e3bf0662\">\n#top .flex_column.av-1zeww1q-bfe732b473110a1237319114e3bf0662{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n.responsive #top #wrap_all .flex_column.av-1zeww1q-bfe732b473110a1237319114e3bf0662{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n<\/style>\n<div  class='flex_column av-1zeww1q-bfe732b473110a1237319114e3bf0662 av_one_third  avia-builder-el-28  el_after_av_textblock  el_before_av_one_third  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-1lhjrj2-5c07252ebae361b329f31190caf8e2d9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock block'  itemprop=\"text\" ><h3>Blackbox research<\/h3>\n<p>In the blackbox phase, the basic assumption is that the attacker does not yet know anything. An example is a hacker visiting a Web site or network for the first time. The attacker then wants to know, for example, whether it is custom software or a standard package and whether vulnerabilities are already known for it. In the blackbox phase, we look at what an attacker can find out and whether there may already be weaknesses that can be directly exploited.<\/p>\n<p>The results of the automated portion of the <a href=\"https:\/\/cyberant.com\/en\/website-security-check\/\">Website Security Check<\/a> or <a href=\"https:\/\/cyberant.com\/en\/network-pentest\/\">Network Pentest<\/a> often provide a solid foundation for this phase, leaving only the custom components to be looked at.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-17x5vzy-52d7afe755ed65425c2320ecea071cef\">\n#top .flex_column.av-17x5vzy-52d7afe755ed65425c2320ecea071cef{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n.responsive #top #wrap_all .flex_column.av-17x5vzy-52d7afe755ed65425c2320ecea071cef{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n<\/style>\n<div  class='flex_column av-17x5vzy-52d7afe755ed65425c2320ecea071cef av_one_third  avia-builder-el-30  el_after_av_one_third  el_before_av_one_third  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-iox4ny-e96f2e36a533795e1e397f9764a9854f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock block'  itemprop=\"text\" ><h3>Greybox research<\/h3>\n<p>In the greybox phase, the attacker knows more. For example, consider a customer who has a login to a customer portal. The attacker has little or no real &#8220;inside information&#8221; at this point, but understands the context of the application and has limited access to it.<\/p>\n<p>The blackbox and greybox phases combined form a good picture of what a hacker can accomplish with limited time.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-r5gcla-d3a5cb3e6e826a9ad84b4803d6284204\">\n#top .flex_column.av-r5gcla-d3a5cb3e6e826a9ad84b4803d6284204{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n.responsive #top #wrap_all .flex_column.av-r5gcla-d3a5cb3e6e826a9ad84b4803d6284204{\nmargin-top:14px;\nmargin-bottom:14px;\n}\n<\/style>\n<div  class='flex_column av-r5gcla-d3a5cb3e6e826a9ad84b4803d6284204 av_one_third  avia-builder-el-32  el_after_av_one_third  avia-builder-el-last  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-rt39b2-38d0e586da61fd648002486f6d7eff65 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock block'  itemprop=\"text\" ><h3>Whitebox research<\/h3>\n<p>At this stage, the attacker knows almost everything. Admin accounts are available, questions can be asked of the developer, and sometimes even source code is available. If all goes well, an attacker will never get this far in real life, but this stage helps the researcher save time. As a rule, a pentest is always timeboxed, while an attacker has unlimited time. For that reason, we often take a <i>shortcut<\/i> by using inside information.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ivx1zs-b0f10039f7662f540d1424a76d61d0eb\">\n.avia-section.av-ivx1zs-b0f10039f7662f540d1424a76d61d0eb{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/03\/chain-lock-blue.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\nmargin-top:3px;\nmargin-bottom:47px;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-ivx1zs-b0f10039f7662f540d1424a76d61d0eb alternate_color avia-section-default avia-no-border-styling  avia-builder-el-34  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll container_wrap sidebar_right'  data-section-bg-repeat='stretch'><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47664'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-9hkmmg-76e3d96f52972eb57cbe62fc8c9c936d av_one_half  avia-builder-el-35  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><\/div><div  class='flex_column av-11q6ysp-f04900af9e45df23f2fd1cf9ba78d565 av_one_half  avia-builder-el-36  el_after_av_one_half  avia-builder-el-last  flex_column_div  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-k96i6h-6740e4487d1ccbbc420dc5c236ecfb5d\">\n#top .av_textblock_section.av-k96i6h-6740e4487d1ccbbc420dc5c236ecfb5d .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-k96i6h-6740e4487d1ccbbc420dc5c236ecfb5d '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h2>Pentest: advice in plain language<\/h2>\n<p>Our ethical hackers perform the pen test using advanced tools and use their creativity to manually expose vulnerabilities. We thoroughly check each system for weaknesses and leaks. If required, we perform the pen test periodically. That way you can be sure you&#8217;ll outsmart hackers. Our experts have years of experience in cybersecurity and always communicate all advice in plain language. That way, you know immediately what to do and are always up to date on the security of your website or system.<\/p>\n<ul>\n<li>CyberAnt&#8217;s ethical hackers are certified<\/li>\n<li>Our hackers have more than 10 years of experience<\/li>\n<li>Our proprietary tooling reduces testing time<\/li>\n<li>Ability to leave our smart tooling in place permanently<\/li>\n<li>Advice in clear language<\/li>\n<li>Providing targeted solutions<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lezqe0zy-904e79855cb3769061b66ba831e29fb0-wrap avia-button-left  avia-builder-el-38  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lezqe0zy-904e79855cb3769061b66ba831e29fb0\">\n#top #wrap_all .avia-button.av-lezqe0zy-904e79855cb3769061b66ba831e29fb0{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-lezqe0zy-904e79855cb3769061b66ba831e29fb0:hover{\nbackground-color:#222222;\ncolor:white;\nopacity:1;\ntransition:all 0.4s ease-in-out;\n}\n<\/style>\n<a href='https:\/\/cyberant.com\/en\/contact\/'  class='avia-button av-lezqe0zy-904e79855cb3769061b66ba831e29fb0 av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Requesting Pentest\"><span class='avia_iconbox_title' >Requesting Pentest<\/span><span class='avia_button_icon avia_button_icon_right' aria-hidden='true' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello'><\/span><\/a><\/div><\/p><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5mbrns-23e9d9eb58780dd88545bc325b48b325\">\n.avia-section.av-5mbrns-23e9d9eb58780dd88545bc325b48b325{\nbackground-color:#ffffff;\nbackground:linear-gradient( to bottom, #ffffff, #ededed );\nmargin-top:33px;\nmargin-bottom:0px;\n}\n<\/style>\n<div id='av_section_6'  class='avia-section av-5mbrns-23e9d9eb58780dd88545bc325b48b325 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-39  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47664'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-l9psp90v-4-565b802ee8904aefbf0b73e3b5f4d848 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Frequently asked questions about the pentest<\/h2>\n<\/div><\/section>\n<div  class='flex_column av-4vmwm0-04c8c016cf66673dd6c77f947d63aabb av_one_half  avia-builder-el-41  el_after_av_textblock  el_before_av_one_half  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-l9qwlx2f-9eacec385257def94fde8fe5a2a75679 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What is a pentest?<\/h3>\n<p>In a penetration test, a security specialist tries to break into a Website. &#8220;Pentest&#8221; is short for &#8220;penetration test. A pentest assesses the security of a Web site or computer system, letting you know if the security is working in practice. This is also known as &#8220;ethical hacking. At the end of the test, you will receive a report and presentation, so you will know exactly where the weaknesses are, and of course, what the strengths are.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lu1ddazg-9536c20b4a606b70c0b9bc2ce7f77198\">\n#top .hr.hr-invisible.av-lu1ddazg-9536c20b4a606b70c0b9bc2ce7f77198{\nheight:33px;\n}\n<\/style>\n<div  class='hr av-lu1ddazg-9536c20b4a606b70c0b9bc2ce7f77198 hr-invisible  avia-builder-el-43  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-3z64zs-b92eb0ee929a45fa0f6355b83bc045b8 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>How does a pentest work?<\/h3>\n<p>Prior to the pentest, the security specialist contacts you to agree on exactly what will be tested, how long the test will take and in what environment the test will take place. Often a test takes place in a test environment that resembles the production environment as much as possible. Within the pre-established framework, the specialist will then pull out all the stops to get in. In doing so, we also make notes of points that do not directly lead to a data breach, but where security can be further enhanced.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1m1wsf2-afbab401bd1b211358722d74b9cb3fb4\">\n#top .hr.hr-invisible.av-1m1wsf2-afbab401bd1b211358722d74b9cb3fb4{\nheight:33px;\n}\n<\/style>\n<div  class='hr av-1m1wsf2-afbab401bd1b211358722d74b9cb3fb4 hr-invisible  avia-builder-el-45  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-leproi9t-7b095b7f6a3872ea5b0ad51e92ae70b4 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Who is a pentest for?<\/h3>\n<p>Pentests are conducted in online environments that really should not be hacked. It has long ceased to be the case that only banks commission pentests. Many companies today have their customer portals, apps and sometimes even entire computer networks subjected to a pentest. Beforehand, it is determined whether a pentest is indeed the most effective solution. Sometimes it is wiser to start first with such things as <a href=\"https:\/\/cyberant.com\/en\/vulnerability-management\/\">vulnerability management<\/a>, a <a href=\"https:\/\/cyberant.com\/en\/website-security-check\/\">Website Security Check<\/a> or training for the developers or administrators. Our free <a href=\"https:\/\/cyberant.com\/en\/quick-scan\/\">Quickscan<\/a> will give you an instant indication of the security of your website. Of course, we will guide your organization so you can make the right choices.<\/p>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-39pfg8-a886b6a075f119a48e5e67e50def8b48 av_one_half  avia-builder-el-47  el_after_av_one_half  el_before_av_hr  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-2tyxxk-78e4782a144543da4e4123cee38288e1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What does a pentest cost?<\/h3>\n<p>The cost of a pentest depends on how large the application is and how extensive the examination needs to be. What needs to be investigated is always determined in consultation with the client. The cost depends on the number of half-day sessions; we charge \u20ac595 per half-day session. For an indication of your situation, we always schedule a free intake first, request an intake <a href=\"https:\/\/cyberant.com\/en\/contact\/\">here<\/a>.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-187844e-6436c81077184671d8f7625ffcba17a7\">\n#top .hr.hr-invisible.av-187844e-6436c81077184671d8f7625ffcba17a7{\nheight:33px;\n}\n<\/style>\n<div  class='hr av-187844e-6436c81077184671d8f7625ffcba17a7 hr-invisible  avia-builder-el-49  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-leprorc2-aad42f4e98f54c59f542654deb22e4af '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Are there any risks associated with a pentest?<\/h3>\n<p>A pentest is not always without risks. Although the security specialist does everything possible to limit damage, it cannot always be prevented. Indeed, real cyber attacks are carried out on the target. For this reason, we discuss in advance how to mitigate the risks. It is often chosen not to test on production servers, but on an environment very similar to this. If that is not possible then the &#8220;rules of engagement&#8221; are determined, for example, by performing certain tasks at night or only when an administrator sits ready to intervene if needed. Despite the risk, it is still important to perform these tests, as a malicious hacker will not be careful either. An indemnity statement is signed in advance indicating that you are aware of the risks and under what conditions the test will be performed.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-wdw1jy-a6d90448d189a80d5d3153774889bc65\">\n#top .hr.hr-invisible.av-wdw1jy-a6d90448d189a80d5d3153774889bc65{\nheight:33px;\n}\n<\/style>\n<div  class='hr av-wdw1jy-a6d90448d189a80d5d3153774889bc65 hr-invisible  avia-builder-el-51  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-leprp0jv-bdb2a7c4fdda539a5c1ac1a1f8a8e22c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Who is CyberAnt?<\/h3>\n<p>CyberAnt is a Zeewolde-based pentesting company specializing in pentesting of websites and custom software. Are you considering a pentest? Please contact <a href=\"https:\/\/cyberant.com\/en\/contact\/\">us via the contact form.<\/a> We will then schedule a time together to discuss the possibilities.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzshpkal-2a4ac3eab4ca29c5d972f55e46e48b11\">\n#top .hr.hr-invisible.av-lzshpkal-2a4ac3eab4ca29c5d972f55e46e48b11{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-lzshpkal-2a4ac3eab4ca29c5d972f55e46e48b11 hr-invisible  avia-builder-el-53  el_after_av_one_half  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_6'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47664'><div class='entry-content-wrapper clearfix'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":48729,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-47664","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47664"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47664\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media\/48729"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}