Pentest Methodologies

An overview of available pentest methodologies.

Our pentesters follow specific methodologies for different types of assets.

By default, our pentesters test for industry standard vulnerabilities from:

For more information on how we pentest, refer to the detailed pages associated with your asset.

In most cases, the Methodology is fixed, based on the Asset Type you defined earlier. However, if you selected a combined asset type, such as Web + API, you can limit the test to either of the individual methodologies:

Choice of Methodologies

Review the methodology for your asset, from the links shown earlier. Each methodology includes default requirements based on standards such as:

You’re welcome to include additional requirements.

Next, you’ll want to set up and share Test Credentials for your pentesters.

Web Pentest Methodologies

Review pentest objectives for Web Apps, including microservices.

Mobile Pentest Methodologies

Review methodologies for Mobile Apps.

API Pentest Methodologies

Review methodologies for APIs. Includes microservices.

External Network Pentests

Review methodologies for External Networks. Includes instances of Microsoft Office 365.

Cloud Pentests

Review methodologies for Cloud Configurations.

Internal Network Pentests

Review methodologies for Internal Networks.

Was this page helpful?

Yes No Create an Issue

Last modified January.01.2023