Trovent Pentest Configurator

Capture requirements and request a budgetary quote


Please provide your penetration test requirements using the available configuration options shown below. As soon as we have received your requirements, you will be contacted by our consultants and provided with a corresponding budgetary proposal.

Scope

Application

Web application, API, mobile app

Website/Domain

URL, domain

Infrastructure

Server, firewalls, network components


 



Informational basis

Blackbox

Minimal information on the target system; publicly available information must be researched

Greybox

Limited information about the target system available

Whitebox

Extensive information on the target system available


Aggressiveness

Passive

Target systems are only passively examined; vulnerabilities found are not exploited

Calculated

Additional attempts are made to exploit identified vulnerabilities; this can have a disruptive impact on targeted systems

Aggressive

Attempts are made to exploit all identified vulnerabilities and disable security systems (e.g. through DoS attack); target systems and adjacent systems may fail completely



Scope

Full

All accessible systems are tested; exceptions must be specified

Limited

A limited number of systems or services shall be tested

Focused

A specific subnet, system or a specific service is to be tested



Approach

Covert

In the reconnaissance phase, only methods that cannot be directly recognised as attempted attacks will be used

Overt

Methods such as extensive port scans can be used; attempted attacks can be recognised



Starting point

Internal

Penetration test from the internal network

External

The target system is attacked from external networks






Summary

Scope:

Informational basis:

Aggressiveness:

Scope:

Approach:

Starting point: