{"id":1310,"date":"2021-03-13T05:54:34","date_gmt":"2021-03-13T05:54:34","guid":{"rendered":"https:\/\/ardent-security.com\/?page_id=1310"},"modified":"2021-04-22T17:20:05","modified_gmt":"2021-04-22T17:20:05","slug":"penetration-testing","status":"publish","type":"page","link":"https:\/\/ardent-security.com\/fr\/test-intrusion\/","title":{"rendered":"Test d'intrusion"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;top-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Services-Individual-Background.svg&#8221; background_position=&#8221;center_right&#8221; custom_margin=&#8221;||||false&#8221; custom_padding=&#8221;40px||40px||true|false&#8221; collapsed=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;p-text&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p class=\"back-r\"><a href=\"https:\/\/ardent-security.com\/fr\/services\/\"><img decoding=\"async\" src=\"https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Arrow-white.svg\" \/> Retourner aux services <\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3 class=\"translation-block\"><strong>Le test d\u2019intrusion<\/strong>  examine tous les aspects de vos applications ou de votre infrastructure TI en utilisant des techniques manuelles avanc\u00e9es de d\u00e9tection de failles.<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;sec-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221;]<\/p>\n<p class=\"app\">Notre approche<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221;]<\/p>\n<h3 class=\"translation-block\">D\u2019un niveau strat\u00e9gique et tactique,<br>\nce service assure la s\u00e9curit\u00e9 \u00e0 long-terme de votre entreprise<br>\nen attaquant manuellement vos syst\u00e8mes et applications sur une base r\u00e9guli\u00e8re.<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;third-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; module_class=&#8221;row-t&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/ardent-security.com\/wp-content\/uploads\/2021\/02\/Attack-1.svg&#8221; title_text=&#8221;Attack&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3>Mentalit\u00e9 offensive<\/h3>\n<p>Nous simulons ce qu\u2019un utilisateur malicieux ou compromis pourrait faire de dommageable contre vos applications, votre infrastructure ou les autres utilisateurs.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Report-0-3.svg&#8221; title_text=&#8221;Report-0-3&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3>Techniques avanc\u00e9es<\/h3>\n<p>Nos experts en cybers\u00e9curit\u00e9 tenteront diff\u00e9rents types d\u2019attaques incluant : ex\u00e9cution de code \u00e0 distance, injections de commandes, les injections SQL, Cross-Site Scripting, \u00e9l\u00e9vation de privil\u00e8ges et autres.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Recommendations1.svg&#8221; title_text=&#8221;Recommendations1&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3>Recommandations<\/h3>\n<p>Nous adh\u00e9rons aux meilleures pratiques de l\u2019industrie comme les m\u00e9thodologies OWASP et PTES que nous surpassons de part le savoir-faire et l\u2019exp\u00e9rience de nos experts en cybers\u00e9curit\u00e9 chevronn\u00e9s et passionn\u00e9s.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; collapsed=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; collapsed=&#8221;off&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;left-service-text&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221;]<\/p>\n<div class=\"s2\">\n<h4 class=\"s3\">Test d'intrusion<\/h4>\n<h3>Pourquoi est-ce important?<\/h3>\n<div class=\"s1\">\n<h4>D\u00e9tecter des failles inconnus (0-day)<\/h4>\n<p>Les outils automatiques ne peuvent d\u00e9tecter de nouvelles vuln\u00e9rabilit\u00e9s, un test d\u2019intrusion le peut gr\u00e2ce \u00e0 l\u2019expertise et la mati\u00e8re grise de notre \u00e9quipe.<\/p>\n<\/div>\n<div class=\"s1\">\n<h4>Assure que vos donn\u00e9es soient prot\u00e9g\u00e9es<\/h4>\n<p>Mettez \u00e0 l\u2019abris vos donn\u00e9es critiques.<\/p>\n<\/div>\n<div class=\"s1\">\n<h4>Soyez \u00e0 jour contre les attaques modernes<\/h4>\n<p>Faites-nous confiance et profitez de notre savoir-faire!<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Home-Page_Image-3.png&#8221; title_text=&#8221;Home-Page_Image-3&#8243; module_class=&#8221;enimg&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/04\/Home-Page_Image-3-fr.png&#8221; title_text=&#8221;Home-Page_Image-3-fr&#8221; module_class=&#8221;frimg&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#3700FF&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; collapsed=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; module_class=&#8221;lst-row&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#3700FF&#8221; custom_padding=&#8221;20px||20px||true|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221;]<\/p>\n<h3>Test de vuln\u00e9rabilit\u00e9s<\/h3>\n<p>Nous scannons votre infrastructure interne ou externe afin de vous donnez une vue d\u2019ensemble sur l\u2019\u00e9tat de votre posture de cybers\u00e9curit\u00e9.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; locked=&#8221;off&#8221;]<\/p>\n<p class=\"more-r\"><a href=\"\/fr\/vulnerability-assessment\/\" >En savoir plus sur ce service <\/a><img decoding=\"async\" src=\"https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Arrow-white.svg\"><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;top-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Services-Individual-Background.svg&#8221; background_position=&#8221;center_right&#8221; custom_margin=&#8221;||||false&#8221; custom_padding=&#8221;40px||40px||true|false&#8221; collapsed=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;p-text&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;] Back to Services [\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;] Penetration Testing examines all aspects of your modern application, using attack tactics to gather exposure points [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;sec-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1310","page","type-page","status-publish","hentry"],"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"Ardent Security","author_link":"https:\/\/ardent-security.com\/fr\/author\/ardentsecur\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;top-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/ardent-security.com\/\/wp-content\/uploads\/2021\/02\/Services-Individual-Background.svg&#8221; background_position=&#8221;center_right&#8221; custom_margin=&#8221;||||false&#8221; custom_padding=&#8221;40px||40px||true|false&#8221; collapsed=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;p-text&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;] Back to Services [\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;] Penetration Testing examines all aspects of your modern application, using attack tactics to gather exposure points [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;sec-sec&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243;\u2026","_links":{"self":[{"href":"https:\/\/ardent-security.com\/fr\/wp-json\/wp\/v2\/pages\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ardent-security.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ardent-security.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ardent-security.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ardent-security.com\/fr\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":0,"href":"https:\/\/ardent-security.com\/fr\/wp-json\/wp\/v2\/pages\/1310\/revisions"}],"wp:attachment":[{"href":"https:\/\/ardent-security.com\/fr\/wp-json\/wp\/v2\/media?parent=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}