Pentest – What analysis approaches are there?

14. February 2020

Attackers gaining unauthorized access to IT systems and applications has severe consequences for companies. Pentests identify possible gateways hackers could exploit and show ways to sustainably raise the IT security level of a company. This makes pentesting one of the most effective methods of security analyses companies can employ to proactively protect themselves against hacking attacks. The security analyst (pentester) tries to penetrate the IT infrastructure of a company with the same methods and means available to a potential attacker.

Read more about the different pentest approaches on the usd website.

Also interesting:

Security Advisories for Jellyfin

The usd HeroLab analysts examined the multimedia application Jellyfin while conducting their security analyses. Two cross-site scripting vulnerabilities were identified that...

read more

Security Advisory for GitLab

The usd HeroLab analysts examined GitLab, a service for version management of software projects, while conducting their security analyses. In the process, a vulnerability was...

read more

Security Advisories for Apache Tomcat

The analysts at usd HeroLab examined the popular Open Source Web Server Apache Tomcat as part of their security analyses. Two vulnerabilities were identified, which made it...

read more