{"id":1310,"date":"2021-03-13T05:54:34","date_gmt":"2021-03-13T05:54:34","guid":{"rendered":"https:\/\/ardent-security.com\/?page_id=1310"},"modified":"2021-04-22T17:20:05","modified_gmt":"2021-04-22T17:20:05","slug":"penetration-testing","status":"publish","type":"page","link":"https:\/\/ardent-security.com\/en\/penetration-testing\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;top-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Services-Individual-Background.svg&#8221; background_position=&#8221;center_right&#8221; custom_margin=&#8221;||||false&#8221; custom_padding=&#8221;40px||40px||true|false&#8221; collapsed=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;p-text&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p class=\"back-r\"><a href=\"https:\/\/ardent-security.com\/\/services\/\"><img decoding=\"async\" src=\"https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Arrow-white.svg\" \/> Back to Services <\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3><strong>Penetration Testing<\/strong> examines all aspects of your modern application, using attack tactics to gather exposure points <\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;sec-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221;]<\/p>\n<p class=\"app\">Our Approach<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221;]<\/p>\n<h3>Both strategic and tactical fronts, this<br \/> solution ensures a safer tomorrow through <br \/>attempting to attack your system<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;third-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; module_class=&#8221;row-t&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/ardent-security.com\/wp-content\/uploads\/2021\/02\/Attack-1.svg&#8221; title_text=&#8221;Attack&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Attacker Mindset<\/h3>\n<p>we simulate what a malicious or compromised user could do by attempting various attack techniques against your infrastructure and applications.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Report-0-3.svg&#8221; title_text=&#8221;Report-0-3&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3>Advanced Techniques<\/h3>\n<p>Our cyber security experts attempt attacks such as remote code execution, command injections, Cross-Site Scripting, SQL injection, privilege escalation, and many more.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Recommendations1.svg&#8221; title_text=&#8221;Recommendations1&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3>Recommendations<\/h3>\n<p>We adhere to industry best practices such as OWASP and PTES methodologies that we supersede and augment by the know-how and experience of our seasoned security experts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; collapsed=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; collapsed=&#8221;off&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;left-service-text&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221;]<\/p>\n<div class=\"s2\">\n<h4 class=\"s3\">Penetration Testing<\/h4>\n<h3>How can this help you<\/h3>\n<div class=\"s1\">\n<h4>Deliver a more secure application<\/h4>\n<p>Test your application inside and out. Protect your clients and their data.<\/p>\n<\/div>\n<div class=\"s1\">\n<h4>Operate in a more secure network<\/h4>\n<p>Having your network pentested makes it harder to compromised. Pentesting can make the difference between normal operations and a full ransomware situation.<\/p>\n<\/div>\n<div class=\"s1\">\n<h4>Leverage modern techniques<\/h4>\n<p>Stay on top of security trends, and techniques. We will get you there!<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Home-Page_Image-3.png&#8221; title_text=&#8221;Home-Page_Image-3&#8243; module_class=&#8221;enimg&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/04\/Home-Page_Image-3-fr.png&#8221; title_text=&#8221;Home-Page_Image-3-fr&#8221; module_class=&#8221;frimg&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#3700FF&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; collapsed=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; module_class=&#8221;lst-row&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#3700FF&#8221; custom_padding=&#8221;20px||20px||true|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221;]<\/p>\n<h3>Vulnerability Assessment<\/h3>\n<p>we scan your internal or external infrastructure to provide you with visibility on your networks status<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; locked=&#8221;off&#8221;]<\/p>\n<p class=\"more-r\"><a href=\"\/vulnerability-assessment\/\" >More about this testing <\/a><img decoding=\"async\" src=\"https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Arrow-white.svg\"><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;top-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Services-Individual-Background.svg&#8221; background_position=&#8221;center_right&#8221; custom_margin=&#8221;||||false&#8221; custom_padding=&#8221;40px||40px||true|false&#8221; collapsed=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;p-text&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;] Back to Services [\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;] Penetration Testing examines all aspects of your modern application, using attack tactics to gather exposure points [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;sec-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1310","page","type-page","status-publish","hentry"],"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"Ardent Security","author_link":"https:\/\/ardent-security.com\/en\/author\/ardentsecur\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;top-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Services-Individual-Background.svg&#8221; background_position=&#8221;center_right&#8221; custom_margin=&#8221;||||false&#8221; custom_padding=&#8221;40px||40px||true|false&#8221; collapsed=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;p-text&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;] Back to Services [\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;] Penetration Testing examines all aspects of your modern application, using attack tactics to gather exposure points [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;sec-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243;&hellip;","_links":{"self":[{"href":"https:\/\/ardent-security.com\/en\/wp-json\/wp\/v2\/pages\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ardent-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ardent-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ardent-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ardent-security.com\/en\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":0,"href":"https:\/\/ardent-security.com\/en\/wp-json\/wp\/v2\/pages\/1310\/revisions"}],"wp:attachment":[{"href":"https:\/\/ardent-security.com\/en\/wp-json\/wp\/v2\/media?parent=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}