Pentest – What analysis approaches are there?

14. February 2020

Attackers gaining unauthorized access to IT systems and applications has severe consequences for companies. Pentests identify possible gateways hackers could exploit and show ways to sustainably raise the IT security level of a company. This makes pentesting one of the most effective methods of security analyses companies can employ to proactively protect themselves against hacking attacks. The security analyst (pentester) tries to penetrate the IT infrastructure of a company with the same methods and means available to a potential attacker.

Read more about the different pentest approaches on the usd website.

Also interesting:

Security Advisory for CleverReach

The analysts at usd HeroLab examined CleverReach as part of their security analyses. This revealed a vulnerability in the  Authentication Bypass Using an Alternate Path or...

read more

Security Advisories for CA Harvest

The analysts at usd HeroLab examined CA Harvest Software Change Manager as part of their security analyses. This revealed a vulnerability in the CSV export functionality, which...

read more