Penetration Test
Attack with the methods of hackers

Penetration Test
Attack with the methods of hackers

In a penetration test, the investigation is focused on a very narrow target, i.e. it is limited to a single web application, for example, which is then investigated extensively and thoroughly. We orient ourselves on OWASP Top10, a list of known vulnerabilities in web applications. The investigations are based on automated scans in combination with manual requests, with an attempt to gain unauthorized access to data or functions or to obtain additional rights.

Similar to the assessment, a risk profile is created from the information and presented to the client as a report that includes countermeasures. Approximately 10 days should be allowed for this type of audit, which lasts from 6 to 8 weeks.

terreActive gives us a partner in the area of vulnerability and penetrating testing that is top-notch both technically and professionally. They let us meet the FINMA requirements in the best possible way. We appreciate having a business relationship that is like a partnership!
Roger Marty
Risk Handling, Head of Security Department
Luzerner Kantonalbank AG