Penetration testing

At Cyberology, our approach is compliant with severalgoverning requirements including PCI DSS 11.3 and is aligned to industry standards

About Us

At Cyberology, our approach is compliant with severalgoverning requirements including PCI DSS 11.3 and is aligned to industry standards Penetration testers identify potential weak points to be exploited by executing a vulnerability scan. Penetration testing is done:

  • manually using the procedures implemented for a particular application and threat category (or)
  • automatically using web application vulnerability scanners, binary analysis and proxy tools.

Talk to Our Experts

The main attacks tested during penetration testing are listed below:

  • Buffer overflows
  • Command injection
  • Cross site scripting
  • SQL injection
  • Server misconfiguration
  • Form manipulation
  • Cookies poisoning
  • Platform weaknesses
  • Weak session administration
web-security