A penetration test, sometimes referred to as a “pentest”, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer’s features and data The process typically identifies the target systems and a particular goal, then reviews available information and undertakes various means to attain the goal.
A penetration test target may be a white box, which provides background and system information, or black box, which provides only basic or no information except the company name.
Black Box provides the Penetration Testing service to businesses or organizations in need of professional penetration testing in order to fully understand and assess potential impacts, recourse, and feasible countermeasures to mitigate or remove unnecessary vulnerability and risk.
Why It’s Valuable and How It’s Beneficial
A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient, and which defenses, if any, the test defeated. Penetration test reports assess potential impacts to the organization and suggest countermeasures to reduce risk.
What You Purchase and Receive
Black Box ensures that our Penetration Testing service provides the expertise and effort necessary to conduct the following plan in order to generate the following report:
- Penetration Testing Plan (PRP): A plain containing the policies, procedures, and work instructions for penetration testing activities, how they are to be conducted, who is responsible for each activity, when the activities are supposed to occur, and what resources are required.
- Penetration Testing Report (PRT): A report containing the results of penetration testing, which provides a full breakdown of each test’s outcome and results, the feasibility of particular types or sets of attacks, identification of high-risk vulnerabilities, assessment of the potential business and operational impacts of successful attacks, and evidence per claim supporting the claims and assessments themselves directly.
How Much It Will Cost
The cost of our Penetration Testing service is determined based on your deadlines and expectations, and the amount of time and effort necessary to provide the deliverables guaranteed by our service level expectations.
How We Will Work Together
All research materials, information, and documentation will be maintained, compiled, and stored by Programming and Application Services, and directly accessible over secure channels or through Black Box secure systems. Private Black Box accounts are created and assigned to our clients as soon as work begins, providing them with limited access to information and documentation related to ongoing design and development requiring client feedback or input.