Penetration Tests take a Vulnerability Assessment (VA) to the next level by trying to exploit found vulnerabilities. Also known as ‘ethical hacking’, these tests emulate the activities of malicious hackers to demonstrate the ability to compromise corporate systems and access data.
The goal of a Source 44 penetration test is to gain access to a customer’s private information using a capture the flag approach. An external penetration test provides visibility into the current state of operating system and software vulnerabilities which could be exploited by ransomware, malware, viruses, etc. A report will outline all systems compromised, the method used to compromise them, and what information was accessed.
While the VA will highlight potential risks within the environment, a penetration test is often an eye-opening exercise that solidifies the magnitude of a breach.