Trovent Pentest Configurator
Capture requirements and request a budgetary quote
Please provide your penetration test requirements using the available configuration options shown below. As soon as we have received your requirements, you will be contacted by our consultants and provided with a corresponding budgetary proposal.
Scope
Application
Website/Domain
Infrastructure
Informational basis
Blackbox
Greybox
Whitebox
Aggressiveness
Passive
Target systems are only passively examined; vulnerabilities found are not exploited
Calculated
Additional attempts are made to exploit identified vulnerabilities; this can have a disruptive impact on targeted systems
Aggressive
Attempts are made to exploit all identified vulnerabilities and disable security systems (e.g. through DoS attack); target systems and adjacent systems may fail completely
Scope
Full
All accessible systems are tested; exceptions must be specified
Limited
A limited number of systems or services shall be tested
Focused
A specific subnet, system or a specific service is to be tested
Approach
Covert
In the reconnaissance phase, only methods that cannot be directly recognised as attempted attacks will be used
Overt
Methods such as extensive port scans can be used; attempted attacks can be recognised
Starting point
Internal
Penetration test from the internal network
External
The target system is attacked from external networks