{"id":1189,"date":"2024-03-13T20:52:04","date_gmt":"2024-03-13T20:52:04","guid":{"rendered":"https:\/\/o2cyber.com\/?page_id=1189"},"modified":"2024-03-30T03:21:13","modified_gmt":"2024-03-30T03:21:13","slug":"automated-pen-testing","status":"publish","type":"page","link":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/","title":{"rendered":"Automated Pen Testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1189\" class=\"elementor elementor-1189\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-70ce7e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"70ce7e6\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-450d346\" data-id=\"450d346\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1a449e elementor-widget elementor-widget-heading\" data-id=\"c1a449e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automated Pen Testing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67992bc elementor-widget-laptop__width-initial elementor-widget elementor-widget-heading\" data-id=\"67992bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Providing C-suites and security teams with hacker lens visibility into advanced cyber attacks with multi layer automated penetration testing in a single dashboard<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba412cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba412cb\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d087ad0\" data-id=\"d087ad0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85a543d elementor-widget elementor-widget-heading\" data-id=\"85a543d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O2Cyber delivers penetration testing (pen testing) services by combining automated tools and human expertise. Following a modern approach to penetration testing and leveraging a diverse set of tools and techniques, helping organizations identify and address security vulnerabilities proactively, enhance their overall security posture, and mitigate the risk of cyber attacks and data breaches.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-966b1e5 elementor-widget elementor-widget-image\" data-id=\"966b1e5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1085\" height=\"663\" src=\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png\" class=\"attachment-full size-full wp-image-1195\" alt=\"\" srcset=\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png 1085w, https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828-300x183.png 300w, https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828-1024x626.png 1024w, https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828-768x469.png 768w\" sizes=\"(max-width: 1085px) 100vw, 1085px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3da2bf5 elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3da2bf5\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c14024a\" data-id=\"c14024a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-aee1e6a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aee1e6a\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-085996c\" data-id=\"085996c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd70bcb elementor-widget elementor-widget-heading\" data-id=\"fd70bcb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Approach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c02fd70 elementor-widget elementor-widget-heading\" data-id=\"c02fd70\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pre-Engagement Phase:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a987429 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a987429\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Scope Definition: Clearly define the scope, objectives, and rules of engagement for the penetration test, including the systems, networks, applications, and target assets to be assessed.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Agreement and Authorization: Obtain written consent and authorization from the organization's stakeholders to conduct the penetration test, ensuring compliance with legal and regulatory requirements.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Information Gathering: Gather preliminary information about the organization's infrastructure, technologies, and potential attack surfaces through passive reconnaissance techniques, such as open-source intelligence (OSINT) and network enumeration.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab312ce elementor-widget elementor-widget-heading\" data-id=\"ab312ce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reconnaissance and Enumeration:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a68dfd5 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a68dfd5\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Active Reconnaissance: Conduct active reconnaissance to identify live hosts, network services, and system vulnerabilities using tools\u00a0<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enumeration: Enumerate network resources, user accounts, and application endpoints to gather additional information that can be leveraged in subsequent attack phases.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b03f941 elementor-widget elementor-widget-heading\" data-id=\"b03f941\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gaining Access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37e1cc3 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"37e1cc3\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">This stage uses web application attacks, such as  <span style=\"color:#EA7C30\">cross-site scripting, SQL injection<\/span>  and  <span style=\"color:#EA7C30\">backdoors,<\/span>  to uncover a target\u2019s vulnerabilities. Testers then try and exploit these vulnerabilities, typically by escalating privileges, stealing data, intercepting traffic, etc., to understand the damage they can cause.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe55331 elementor-widget elementor-widget-heading\" data-id=\"fe55331\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Maintaining access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-842a9f2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"842a9f2\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The goal of this stage is to see if the vulnerability can be used to achieve a persistent presence in the exploited system\u2014 long enough for a bad actor to gain in-depth access. The idea is to imitate  <span style=\"color:#EA7C30\">advanced persistent threats,<\/span>  which often remain in a system for months in order to steal an organization\u2019s most sensitive data.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bee6c6b elementor-widget elementor-widget-heading\" data-id=\"bee6c6b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e64c60 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6e64c60\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automated Scanning: Use vulnerability scanning tools to perform automated scans of the target infrastructure and identify known vulnerabilities in systems, services, and applications.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Manual Assessment: Augment automated scanning with manual vulnerability assessment techniques, including manual verification of identified vulnerabilities and validation of potential exploitability.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61da20f elementor-widget elementor-widget-heading\" data-id=\"61da20f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Exploitation and Post-Exploitation:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16d443a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"16d443a\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Exploitation of Vulnerabilities: Attempt to exploit identified vulnerabilities to gain unauthorized access to systems, escalate privileges, and compromise sensitive data.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Post-Exploitation Activities: Conduct post-exploitation activities, such as lateral movement, privilege escalation, and data exfiltration, to simulate the actions of a real-world attacker and assess the extent of potential damage.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e517fe6 elementor-widget elementor-widget-heading\" data-id=\"e517fe6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reporting and Documentation:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2f4a2d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b2f4a2d\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Findings Documentation: Document all identified vulnerabilities, exploits, and attack paths discovered during the penetration test, including detailed descriptions, risk assessments, and remediation recommendations.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Executive Summary: Prepare an executive summary highlighting key findings, risk exposure, and actionable recommendations for senior management and stakeholders.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Technical Report: Provide a detailed technical report with comprehensive information about each vulnerability, including proof-of-concept (PoC) exploits, attack vectors, and remediation guidance for IT and security teams.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d71e47 elementor-widget elementor-widget-heading\" data-id=\"6d71e47\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Remediation and Follow-Up:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c38bae8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c38bae8\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Remediation Guidance: Collaborate with the organization's IT and security teams to prioritize and remediate identified vulnerabilities based on their severity and potential impact on business operations.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Re-Testing: Conduct follow-up penetration tests to validate the effectiveness of remediation efforts and ensure that identified vulnerabilities have been adequately addressed.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Continuous Improvement: Provide recommendations for improving the organization's overall security posture, including the implementation of security best practices, employee training programs, and ongoing vulnerability management processes.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd0b42f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd0b42f\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-568793e\" data-id=\"568793e\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e8c14c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e8c14c0\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-883b0e6\" data-id=\"883b0e6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c3138f elementor-widget elementor-widget-heading\" data-id=\"1c3138f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Approach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff61794 elementor-widget elementor-widget-image\" data-id=\"ff61794\" data-element_type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:19,&quot;sizes&quot;:[]},&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:49,&quot;end&quot;:84}},&quot;motion_fx_opacity_effect&quot;:&quot;yes&quot;,&quot;motion_fx_opacity_level&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:8,&quot;sizes&quot;:[]},&quot;motion_fx_opacity_direction&quot;:&quot;out-in&quot;,&quot;motion_fx_opacity_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:20,&quot;end&quot;:80}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet_extra&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;]}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"784\" height=\"637\" src=\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Frame-48097371-1.png\" class=\"attachment-full size-full wp-image-4758\" alt=\"\" srcset=\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Frame-48097371-1.png 784w, https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Frame-48097371-1-300x244.png 300w, https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Frame-48097371-1-768x624.png 768w\" sizes=\"(max-width: 784px) 100vw, 784px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a43e556\" data-id=\"a43e556\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e9dd56a elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"e9dd56a\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><circle cx=\"17\" cy=\"17\" r=\"16.5\" stroke=\"#1E1E1E\"><\/circle><path d=\"M17.07 23V11.66H15.72L16.08 10.4H18.33V23H17.07Z\" fill=\"black\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22f6ec6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"22f6ec6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pre-Engagement Phase:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-620655e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"620655e\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Establishing clear parameters defining the scope and objectives of the\u2028penetration test, alongside obtaining written consent from stakeholders, is\u2028crucial to ensure compliance with legal requirements, while also gathering\u2028preliminary information through passive reconnaissance techniques<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3577d07 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"3577d07\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><circle cx=\"17\" cy=\"17\" r=\"16.5\" stroke=\"#1E1E1E\"><\/circle><path d=\"M12.72 23V21.884C13.212 21.428 13.752 20.93 14.34 20.39C14.928 19.844 15.51 19.283 16.086 18.707C16.668 18.125 17.199 17.552 17.679 16.988C18.159 16.418 18.543 15.881 18.831 15.377C19.125 14.867 19.272 14.417 19.272 14.027C19.272 13.553 19.155 13.121 18.921 12.731C18.693 12.335 18.384 12.02 17.994 11.786C17.61 11.546 17.181 11.426 16.707 11.426C16.233 11.426 15.798 11.546 15.402 11.786C15.012 12.02 14.7 12.335 14.466 12.731C14.232 13.121 14.115 13.553 14.115 14.027H12.855C12.855 13.307 13.029 12.656 13.377 12.074C13.731 11.492 14.199 11.03 14.781 10.688C15.363 10.34 16.005 10.166 16.707 10.166C17.409 10.166 18.048 10.34 18.624 10.688C19.206 11.036 19.668 11.501 20.01 12.083C20.358 12.665 20.532 13.313 20.532 14.027C20.532 14.453 20.418 14.921 20.19 15.431C19.968 15.935 19.665 16.46 19.281 17.006C18.897 17.546 18.465 18.092 17.985 18.644C17.505 19.196 17.004 19.736 16.482 20.264C15.96 20.786 15.453 21.278 14.961 21.74H20.721V23H12.72Z\" fill=\"black\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-980babb elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"980babb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reconnaissance and Enumeration:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33d5c39 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"33d5c39\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Perform active reconnaissance to uncover live hosts, network services, and system vulnerabilities, while also enumerating network resources, user accounts, and application endpoints to collect supplementary data for subsequent attack stages.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e26834 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8e26834\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><circle cx=\"17\" cy=\"17\" r=\"16.5\" stroke=\"#1E1E1E\"><\/circle><path d=\"M17.419 23.234C16.651 23.234 15.976 23.066 15.394 22.73C14.812 22.388 14.356 21.932 14.026 21.362C13.702 20.792 13.54 20.162 13.54 19.472H14.8C14.8 19.928 14.905 20.348 15.115 20.732C15.331 21.11 15.634 21.413 16.024 21.641C16.414 21.863 16.879 21.974 17.419 21.974C17.875 21.974 18.301 21.863 18.697 21.641C19.099 21.413 19.423 21.11 19.669 20.732C19.921 20.348 20.047 19.928 20.047 19.472C20.047 18.902 19.903 18.428 19.615 18.05C19.327 17.666 18.931 17.381 18.427 17.195C17.923 17.003 17.347 16.907 16.699 16.907V15.863C17.593 15.863 18.31 15.674 18.85 15.296C19.396 14.912 19.669 14.351 19.669 13.613C19.669 13.211 19.558 12.845 19.336 12.515C19.12 12.185 18.835 11.921 18.481 11.723C18.133 11.519 17.758 11.417 17.356 11.417C16.954 11.417 16.567 11.519 16.195 11.723C15.829 11.921 15.529 12.185 15.295 12.515C15.067 12.845 14.953 13.211 14.953 13.613H13.693C13.693 13.139 13.792 12.695 13.99 12.281C14.188 11.861 14.458 11.492 14.8 11.174C15.142 10.856 15.532 10.607 15.97 10.427C16.408 10.247 16.867 10.157 17.347 10.157C17.977 10.157 18.562 10.313 19.102 10.625C19.648 10.937 20.089 11.354 20.425 11.876C20.761 12.398 20.929 12.977 20.929 13.613C20.929 14.231 20.77 14.789 20.452 15.287C20.134 15.785 19.705 16.136 19.165 16.34C19.633 16.496 20.026 16.733 20.344 17.051C20.662 17.363 20.902 17.726 21.064 18.14C21.226 18.554 21.307 18.998 21.307 19.472C21.307 20.162 21.127 20.792 20.767 21.362C20.407 21.932 19.93 22.388 19.336 22.73C18.748 23.066 18.109 23.234 17.419 23.234Z\" fill=\"black\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eee476 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1eee476\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gaining Access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c26382 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3c26382\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Web application vulnerabilities such as cross-site scripting, SQL injection, and backdoors are exploited by testers to assess potential damage through actions like privilege escalation, data theft, and traffic interception.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e43ac16 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"e43ac16\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><circle cx=\"17\" cy=\"17\" r=\"16.5\" stroke=\"#1E1E1E\"><\/circle><path d=\"M18.156 23V19.463H12.72V18.185L17.832 10.4H19.416V18.203H20.739V19.463H19.416V23H18.156ZM14.214 18.185L18.156 18.203L18.129 12.2L14.214 18.185Z\" fill=\"black\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8d4b11 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"a8d4b11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Maintaining access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b6796 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"26b6796\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Determine if the vulnerability permits sustained access to the compromised system, akin to advanced persistent threats, which linger within systems for extended periods to pilfer critical organizational data<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03d4baa elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"03d4baa\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><circle cx=\"17\" cy=\"17\" r=\"16.5\" stroke=\"#1E1E1E\"><\/circle><path d=\"M16.761 23.234C15.993 23.234 15.294 23.048 14.664 22.676C14.04 22.304 13.545 21.806 13.179 21.182C12.813 20.552 12.63 19.862 12.63 19.112H13.89C13.89 19.634 14.019 20.114 14.277 20.552C14.535 20.984 14.88 21.329 15.312 21.587C15.75 21.845 16.233 21.974 16.761 21.974C17.283 21.974 17.76 21.845 18.192 21.587C18.624 21.329 18.969 20.984 19.227 20.552C19.491 20.114 19.623 19.634 19.623 19.112C19.623 18.584 19.497 18.104 19.245 17.672C18.999 17.234 18.648 16.886 18.192 16.628C17.742 16.364 17.205 16.232 16.581 16.232H13.521L14.709 10.4H20.604V11.66H15.726L15.069 14.972L16.536 14.981C17.394 14.993 18.147 15.176 18.795 15.53C19.449 15.884 19.959 16.37 20.325 16.988C20.697 17.6 20.883 18.308 20.883 19.112C20.883 19.676 20.775 20.207 20.559 20.705C20.349 21.203 20.052 21.644 19.668 22.028C19.29 22.406 18.852 22.703 18.354 22.919C17.862 23.129 17.331 23.234 16.761 23.234Z\" fill=\"black\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c18b74 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2c18b74\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4584c09 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"4584c09\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Combine automated scanning with manual assessment techniques to\u2028comprehensively identify and validate known vulnerabilities in systems, services, and applications<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c17c63f elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"c17c63f\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><circle cx=\"17\" cy=\"17\" r=\"16.5\" stroke=\"#1E1E1E\"><\/circle><path d=\"M16.788 23.234C15.996 23.234 15.27 23.039 14.61 22.649C13.956 22.253 13.431 21.725 13.035 21.065C12.645 20.405 12.45 19.676 12.45 18.878C12.45 18.416 12.504 18.023 12.612 17.699C12.72 17.369 12.879 17.003 13.089 16.601L16.662 10.4H18.129L15.51 14.936C16.038 14.732 16.569 14.642 17.103 14.666C17.637 14.684 18.147 14.801 18.633 15.017C19.119 15.233 19.551 15.53 19.929 15.908C20.307 16.28 20.604 16.718 20.82 17.222C21.042 17.726 21.153 18.278 21.153 18.878C21.153 19.478 21.039 20.042 20.811 20.57C20.583 21.092 20.268 21.554 19.866 21.956C19.47 22.352 19.008 22.664 18.48 22.892C17.952 23.12 17.388 23.234 16.788 23.234ZM16.788 21.974C17.388 21.974 17.922 21.83 18.39 21.542C18.858 21.248 19.224 20.864 19.488 20.39C19.758 19.916 19.893 19.409 19.893 18.869C19.893 18.305 19.755 17.792 19.479 17.33C19.203 16.862 18.831 16.49 18.363 16.214C17.895 15.932 17.376 15.791 16.806 15.791C16.218 15.791 15.69 15.935 15.222 16.223C14.754 16.511 14.385 16.889 14.115 17.357C13.845 17.819 13.71 18.323 13.71 18.869C13.71 19.457 13.851 19.985 14.133 20.453C14.421 20.921 14.799 21.293 15.267 21.569C15.735 21.839 16.242 21.974 16.788 21.974Z\" fill=\"black\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9e1e98 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"a9e1e98\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Exploitation and Post-Exploitation:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8be942c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8be942c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Exploit identified vulnerabilities for unauthorized access, escalate privileges, and compromise sensitive data, proceed with post-exploitation activities like lateral movement and data exfiltration to mimic real-world attacker behavior and gauge potential damage<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-008f4b4 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"008f4b4\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><circle cx=\"17\" cy=\"17\" r=\"16.5\" stroke=\"#1E1E1E\"><\/circle><path d=\"M13.269 23L19.803 11.66H12.36V10.4H21.261V11.66L14.709 23H13.269Z\" fill=\"black\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4e7ff2 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b4e7ff2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reporting and Documentation:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bab4170 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"bab4170\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Comprehensively document all penetration test findings, including vulnerabilities and exploits and attack paths in detailed reports tailored for different stakeholders' needs<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-776a013 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"776a013\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"34\" height=\"34\" viewBox=\"0 0 34 34\" fill=\"none\"><circle cx=\"17\" cy=\"17\" r=\"16.5\" stroke=\"#1E1E1E\"><\/circle><path d=\"M16.734 23.234C15.996 23.234 15.321 23.066 14.709 22.73C14.103 22.394 13.62 21.944 13.26 21.38C12.9 20.816 12.72 20.189 12.72 19.499C12.72 18.827 12.906 18.215 13.278 17.663C13.65 17.105 14.133 16.673 14.727 16.367C14.235 16.085 13.83 15.701 13.512 15.215C13.194 14.723 13.035 14.183 13.035 13.595C13.035 12.965 13.2 12.392 13.53 11.876C13.866 11.354 14.313 10.94 14.871 10.634C15.435 10.322 16.056 10.166 16.734 10.166C17.412 10.166 18.03 10.322 18.588 10.634C19.152 10.94 19.599 11.354 19.929 11.876C20.265 12.392 20.433 12.965 20.433 13.595C20.433 14.183 20.274 14.723 19.956 15.215C19.644 15.701 19.239 16.085 18.741 16.367C19.347 16.673 19.833 17.105 20.199 17.663C20.571 18.215 20.757 18.827 20.757 19.499C20.757 20.183 20.574 20.81 20.208 21.38C19.848 21.944 19.365 22.394 18.759 22.73C18.153 23.066 17.478 23.234 16.734 23.234ZM16.734 21.974C17.232 21.974 17.682 21.863 18.084 21.641C18.486 21.419 18.807 21.122 19.047 20.75C19.287 20.372 19.407 19.955 19.407 19.499C19.407 19.043 19.287 18.629 19.047 18.257C18.807 17.885 18.486 17.588 18.084 17.366C17.682 17.144 17.232 17.033 16.734 17.033C16.248 17.033 15.801 17.144 15.393 17.366C14.991 17.588 14.667 17.885 14.421 18.257C14.181 18.629 14.061 19.043 14.061 19.499C14.061 19.955 14.181 20.372 14.421 20.75C14.667 21.122 14.991 21.419 15.393 21.641C15.801 21.863 16.248 21.974 16.734 21.974ZM16.734 15.773C17.172 15.773 17.568 15.677 17.922 15.485C18.276 15.287 18.558 15.023 18.768 14.693C18.984 14.363 19.092 13.997 19.092 13.595C19.092 13.193 18.984 12.83 18.768 12.506C18.558 12.176 18.276 11.915 17.922 11.723C17.568 11.525 17.172 11.426 16.734 11.426C16.302 11.426 15.906 11.525 15.546 11.723C15.192 11.915 14.907 12.176 14.691 12.506C14.481 12.83 14.376 13.193 14.376 13.595C14.376 13.997 14.481 14.363 14.691 14.693C14.907 15.023 15.192 15.287 15.546 15.485C15.906 15.677 16.302 15.773 16.734 15.773Z\" fill=\"black\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d39255b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d39255b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Remediation and Follow-Up:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30ee36b elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"30ee36b\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Engage with the organization's IT and security teams to prioritize and address vulnerabilities, conduct follow-up tests to verify remediation effectiveness, and offer suggestions for enhancing overall security through best practices, training, and ongoing vulnerability management.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f057b57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f057b57\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-637e0f7\" data-id=\"637e0f7\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-79d317d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79d317d\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-34c9645\" data-id=\"34c9645\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ee4ee2 elementor-widget elementor-widget-heading\" data-id=\"5ee4ee2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced continuous red team \/ security testing Vs one time red team<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a38ffa2 elementor-widget elementor-widget-heading\" data-id=\"a38ffa2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our approach to PTaaS seeks to modernize penetration testing by delivering testing services that are a combination of automated tools and human expertise. This blended mix of service delivery enables meeting both point-in-time and continuous testing objectives. The PTaaS offering allows clients to get quicker, more actionable and highly mobilized results about threats and exposure more frequently than with a project-based penetration testing method \u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e06d8e2 elementor-widget elementor-widget-heading\" data-id=\"e06d8e2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Here are top reasons for using a PTaaS offering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-327036b elementor-widget elementor-widget-heading\" data-id=\"327036b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequency of Testing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c03a62 elementor-widget elementor-widget-heading\" data-id=\"6c03a62\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A major benefit of PTaaS over a project-based penetration test is the frequency of testing. PTaaS is a continuous, uninterrupted effort over the course of the contract life span, say one to three years. This gives clients data about risks more frequently, and the window of time from risk exposure to risk remediation is shortened. In contrast, a project-based penetration test may leave up to a year from a risk being exposed until it\u2019s discovered. PTaaS automates many of the traditionally labor-intensive tasks that can delay traditional pentesting.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4635ac elementor-widget elementor-widget-heading\" data-id=\"d4635ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance Objectives<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d124616 elementor-widget elementor-widget-heading\" data-id=\"d124616\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">For some clients, the main reason for getting a penetration test is to comply with getting a penetration test done by a third party, as mandated to them by a regulatory or auditing body. Often referred to as check-box testing, PTaaS can help clients meet regulatory testing requirements as part of the service.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c5c155 elementor-widget elementor-widget-heading\" data-id=\"5c5c155\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Exposure Reduction<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4184e68 elementor-widget elementor-widget-heading\" data-id=\"4184e68\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risk can come in many forms and there is not a simple one-size-fits-all. However, the modern attack landscape shows that overlooked exposure, unsecure systems and overall lack of visibility into attack readiness make for a high-risk situation for clients. The time of exposure to transient risks is critical, and even a very thorough project-based penetration test might be too late to reduce these fast-moving risks. PTaaS helps reduce risk due to dynamic exposure thanks to its high frequency of delivery.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b422071 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b422071\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6dcc91b\" data-id=\"6dcc91b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1d6aff8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d6aff8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-976413c\" data-id=\"976413c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd50976 elementor-widget elementor-widget-heading\" data-id=\"dd50976\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b5ae9f elementor-widget elementor-widget-heading\" data-id=\"3b5ae9f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In addition to helping clients meet a variety of testing objectives, PTaaS has a number of benefits over traditional project-based penetration testing services.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0072e7c elementor-widget elementor-widget-heading\" data-id=\"0072e7c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Managing Cost\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cc9d2c elementor-widget elementor-widget-heading\" data-id=\"5cc9d2c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Increasing the frequency of project-based penetration testing to a monthly deliverable is possible, but the cost to do so exceeds the annual testing budget of most organizations. PTaaS helps manage cost bloat by delivering a highly scalable offering that is more conducive to monthly testing. Extensive use of automation and the standardization of testing allow for better scaling of billable talent hours. This makes more frequent testing possible without cost bloat.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a03d84 elementor-widget elementor-widget-heading\" data-id=\"7a03d84\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI driven Risk-Based Prioritization<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe35ed elementor-widget elementor-widget-heading\" data-id=\"4fe35ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PTaaS vendors take a risk-based approach and prioritize exposure for remediation and mitigation based on real risk to the organization. Factors typically include visibility and accessibility of the asset, attractiveness of the asset, importance to the business and the severity of the threat itself.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63fb2ca elementor-widget elementor-widget-heading\" data-id=\"63fb2ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Better Results Mobilization<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b4aaca elementor-widget elementor-widget-heading\" data-id=\"7b4aaca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mobilization of findings refers to how quickly testing results can go from discovery to remediation by the asset owner. The classic PDF document of a project-based penetration test isn\u2019t very mobile, making it increasingly difficult to effectuate fixes. It takes analysis and manual efforts by the client \u2014 often tasking various asset owners with the correct perspectives \u2014 to identify which remediation paths are possible or achievable.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a80f0e elementor-widget elementor-widget-heading\" data-id=\"6a80f0e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PTaaS increases results mobilization by allowing the findings to be viewed and acted on within a web portal. This portal can quickly link findings to prescriptive actions, and also use external APIs to ticketing systems to help facilitate the mobilization of findings to the right team with the right actions.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-deff139 elementor-widget elementor-widget-heading\" data-id=\"deff139\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In addition, PTaaS offers real-time collaboration, allowing developers to talk to and receive guidance directly from pentesters instead of arguing with scanners, such as dynamic or static application security testing (DAST\/SAST) scanners. It is important to note, however, that realizing the value of these types of tests depends on the existence of established workflows and processes across development and operations.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc2c7c1 elementor-widget elementor-widget-heading\" data-id=\"bc2c7c1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Possible Testing Tools Consolidation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee37e11 elementor-widget elementor-widget-heading\" data-id=\"ee37e11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some PTaaS providers offer a suite of testing tools as an add-on to the service. Automated testing tools such as external attack surface management (EASM) and vulnerability scanners can be included, and linked directly to the PTaaS testing pipeline. Some clients may find the automated testing tools that are available as an add-on in PTaaS adequate enough to discontinue paying for licensing of other third-party tools.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Automated Pen Testing Providing C-suites and security teams with hacker lens visibility into advanced cyber attacks with multi layer automated [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1189","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Automated Pen Testing | O2 Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automated Pen Testing | O2 Cyber\" \/>\n<meta property=\"og:description\" content=\"Automated Pen Testing Providing C-suites and security teams with hacker lens visibility into advanced cyber attacks with multi layer automated [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"O2 Cyber\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-30T03:21:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/\",\"url\":\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/\",\"name\":\"Automated Pen Testing | O2 Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/o2cyber.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png\",\"datePublished\":\"2024-03-13T20:52:04+00:00\",\"dateModified\":\"2024-03-30T03:21:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#primaryimage\",\"url\":\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png\",\"contentUrl\":\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png\",\"width\":1085,\"height\":663},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/o2cyber.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automated Pen Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/o2cyber.com\/#website\",\"url\":\"https:\/\/o2cyber.com\/\",\"name\":\"O2 Cyber\",\"description\":\"Smart solutions | Securing tomorrow\",\"publisher\":{\"@id\":\"https:\/\/o2cyber.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/o2cyber.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/o2cyber.com\/#organization\",\"name\":\"O2 Cyber\",\"url\":\"https:\/\/o2cyber.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/o2cyber.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Mask-group-9-1.png\",\"contentUrl\":\"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Mask-group-9-1.png\",\"width\":229,\"height\":60,\"caption\":\"O2 Cyber\"},\"image\":{\"@id\":\"https:\/\/o2cyber.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automated Pen Testing | O2 Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/","og_locale":"en_GB","og_type":"article","og_title":"Automated Pen Testing | O2 Cyber","og_description":"Automated Pen Testing Providing C-suites and security teams with hacker lens visibility into advanced cyber attacks with multi layer automated [&hellip;]","og_url":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/","og_site_name":"O2 Cyber","article_modified_time":"2024-03-30T03:21:13+00:00","og_image":[{"url":"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/","url":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/","name":"Automated Pen Testing | O2 Cyber","isPartOf":{"@id":"https:\/\/o2cyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#primaryimage"},"image":{"@id":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png","datePublished":"2024-03-13T20:52:04+00:00","dateModified":"2024-03-30T03:21:13+00:00","breadcrumb":{"@id":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#primaryimage","url":"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png","contentUrl":"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Group-1000002828.png","width":1085,"height":663},{"@type":"BreadcrumbList","@id":"https:\/\/o2cyber.com\/index.php\/automated-pen-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/o2cyber.com\/"},{"@type":"ListItem","position":2,"name":"Automated Pen Testing"}]},{"@type":"WebSite","@id":"https:\/\/o2cyber.com\/#website","url":"https:\/\/o2cyber.com\/","name":"O2 Cyber","description":"Smart solutions | Securing tomorrow","publisher":{"@id":"https:\/\/o2cyber.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/o2cyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/o2cyber.com\/#organization","name":"O2 Cyber","url":"https:\/\/o2cyber.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/o2cyber.com\/#\/schema\/logo\/image\/","url":"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Mask-group-9-1.png","contentUrl":"https:\/\/o2cyber.com\/wp-content\/uploads\/2024\/03\/Mask-group-9-1.png","width":229,"height":60,"caption":"O2 Cyber"},"image":{"@id":"https:\/\/o2cyber.com\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"O2Cyber","author_link":"https:\/\/o2cyber.com\/index.php\/author\/admin123\/"},"uagb_comment_info":0,"uagb_excerpt":"Automated Pen Testing Providing C-suites and security teams with hacker lens visibility into advanced cyber attacks with multi layer automated [&hellip;]","_links":{"self":[{"href":"https:\/\/o2cyber.com\/index.php\/wp-json\/wp\/v2\/pages\/1189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/o2cyber.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/o2cyber.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/o2cyber.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/o2cyber.com\/index.php\/wp-json\/wp\/v2\/comments?post=1189"}],"version-history":[{"count":190,"href":"https:\/\/o2cyber.com\/index.php\/wp-json\/wp\/v2\/pages\/1189\/revisions"}],"predecessor-version":[{"id":4764,"href":"https:\/\/o2cyber.com\/index.php\/wp-json\/wp\/v2\/pages\/1189\/revisions\/4764"}],"wp:attachment":[{"href":"https:\/\/o2cyber.com\/index.php\/wp-json\/wp\/v2\/media?parent=1189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}