{"id":88077,"date":"2024-02-18T13:50:39","date_gmt":"2024-02-18T12:50:39","guid":{"rendered":"https:\/\/www.nordasys.com\/application-penetration-testing\/"},"modified":"2026-01-06T11:26:11","modified_gmt":"2026-01-06T10:26:11","slug":"application-penetration-testing","status":"publish","type":"page","link":"https:\/\/www.nordasys.com\/en\/application-penetration-testing\/","title":{"rendered":"Application Penetration Testing"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;2&#8243; bottom_padding=&#8221;2&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;0&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_font=&#8221;font-555555&#8243; text_size=&#8221;fontsize-916361&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;119313&#8243;]Application Penetration Testing[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon_image=&#8221;85844&#8243; icon_color=&#8221;accent&#8221; media_size=&#8221;100&#8243; text_size=&#8221;h4&#8243; title=&#8221;Vulnerabilities&#8221; link=&#8221;|||&#8221;]We detect and test vulnerabilities in applications, portals, and systems[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon_image=&#8221;85833&#8243; icon_color=&#8221;accent&#8221; media_size=&#8221;100&#8243; text_size=&#8221;h4&#8243; title=&#8221;Web Applications&#8221; link=&#8221;|||&#8221;]We test web applications \u2013 both complex and the simplest ones[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon_image=&#8221;85843&#8243; icon_color=&#8221;accent&#8221; media_size=&#8221;100&#8243; text_size=&#8221;h4&#8243; title=&#8221;Application Analysis&#8221; link=&#8221;|||&#8221;]We analyze software code and the development process to identify vulnerabilities[\/vc_icon][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=&#8221;2&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon_image=&#8221;85839&#8243; icon_color=&#8221;accent&#8221; media_size=&#8221;100&#8243; text_size=&#8221;h4&#8243; title=&#8221;Security Measures&#8221; link=&#8221;|||&#8221;]We test implemented security measures and authorization systems[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon_image=&#8221;85779&#8243; icon_color=&#8221;accent&#8221; media_size=&#8221;100&#8243; text_size=&#8221;h4&#8243; title=&#8221;Servers \/ Infrastructure&#8221; link=&#8221;|||&#8221;]We test the security of individual systems and the entire infrastructure[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon_image=&#8221;85791&#8243; icon_color=&#8221;accent&#8221; media_size=&#8221;100&#8243; text_size=&#8221;h4&#8243; title=&#8221;Business Logic&#8221; link=&#8221;|||&#8221; uncode_shortcode_id=&#8221;113781&#8243; icon_color_type=&#8221;uncode-palette&#8221;]We verify business logic in applications and processes[\/vc_icon][\/vc_column_inner][\/vc_row_inner][vc_button button_color=&#8221;color-204718&#8243; size=&#8221;btn-lg&#8221; hover_fx=&#8221;outlined&#8221; border_width=&#8221;0&#8243; width=&#8221;400&#8243; icon=&#8221;fa fa-chevron-right&#8221;]Are you interested in our offer? Contact us  &gt;[\/vc_button][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;0&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; font_family=&#8221;font-555555&#8243; overlay_alpha=&#8221;50&#8243; border_color=&#8221;color-jevc&#8221; border_style=&#8221;solid&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_custom_heading text_font=&#8221;font-555555&#8243; text_size=&#8221;fontsize-916361&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]For Every Business[\/vc_custom_heading][vc_custom_heading text_size=&#8221;h4&#8243; text_weight=&#8221;300&#8243; text_height=&#8221;fontheight-791337&#8243;]Security testing should be implemented in every organization, institution, or company \u2013 regardless of its size or industry. Any oversight or error can be exploited to compromise systems, leak data, or cause other incidents. Each occurrence of such an event can impact the organization&#8217;s reputation and financial stability.[\/vc_custom_heading][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_custom_heading text_font=&#8221;font-555555&#8243; text_size=&#8221;fontsize-916361&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]Sensitive Data[\/vc_custom_heading][vc_custom_heading text_size=&#8221;h4&#8243; text_weight=&#8221;300&#8243; text_height=&#8221;fontheight-791337&#8243;]Possessing sensitive data such as PESEL numbers, names, surnames along with residential addresses, and email addresses entails the obligation to store and protect them appropriately. Commonly used security measures are not always the right choice. Verify the security measures used by your IT team and ensure you are secure.[\/vc_custom_heading][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_custom_heading text_color=&#8221;accent&#8221; heading_semantic=&#8221;div&#8221; text_font=&#8221;font-555555&#8243; text_size=&#8221;fontsize-100587&#8243;]71%[\/vc_custom_heading][vc_column_text]This percentage of all attacks is financially motivated. <em>Verizon.<\/em>[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;0&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; font_family=&#8221;font-555555&#8243; overlay_alpha=&#8221;50&#8243; border_color=&#8221;color-jevc&#8221; border_style=&#8221;solid&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243;][vc_custom_heading text_font=&#8221;font-555555&#8243; text_size=&#8221;fontsize-916361&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]Types of penetration<\/p>\n<p>tests performed[\/vc_custom_heading][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; text_weight=&#8221;300&#8243; text_height=&#8221;fontheight-791337&#8243;]Depending on the type of system or IT infrastructure component being examined and the client&#8217;s preferences, penetration tests can be conducted both at the client&#8217;s premises and remotely. For penetration tests, we utilize both tools that automate testing and simulate attacks, as well as manual verification methods. The ratio of automated tests to manually performed ones varies depending on the project&#8217;s specifics.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;0&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; font_family=&#8221;font-555555&#8243; overlay_alpha=&#8221;50&#8243; border_color=&#8221;color-jevc&#8221; border_style=&#8221;solid&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; back_color=&#8221;color-jevc&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_custom_heading text_size=&#8221;h3&#8243; text_weight=&#8221;500&#8243;]Black Box[\/vc_custom_heading][vc_custom_heading text_size=&#8221;h4&#8243; text_weight=&#8221;300&#8243;]This is the most complex and time-consuming test, reflecting the real actions of potential attackers.[\/vc_custom_heading][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; back_color=&#8221;color-uydo&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_custom_heading text_size=&#8221;h3&#8243; text_weight=&#8221;500&#8243;]Grey Box[\/vc_custom_heading][vc_custom_heading text_size=&#8221;h4&#8243; text_weight=&#8221;300&#8243;]This is a compromise between black-box and white-box tests, where we receive basic information from the client \u2013 e.g., roles.[\/vc_custom_heading][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; font_family=&#8221;font-555555&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_custom_heading text_font=&#8221;font-555555&#8243; text_size=&#8221;fontsize-916361&#8243; text_weight=&#8221;500&#8243;]White Box[\/vc_custom_heading][vc_custom_heading text_size=&#8221;h4&#8243; text_weight=&#8221;300&#8243;]This is the most comprehensive type of test, during which we have full information about the infrastructure and applications in the form of documentation or code.[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243;][vc_custom_heading text_color=&#8221;color-jevc&#8221; heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]Penetration Test Execution[\/vc_custom_heading][vc_column_text]All projects are carried out in accordance with industry-standard, globally recognized standards and methodologies, such as:<\/p>\n<ul>\n<li>OWASP ASVS,<\/li>\n<li>PCI DSS Penetration Testing Guidance,<\/li>\n<li>OSSTMM,<\/li>\n<li>ISO27001 guidelines,<\/li>\n<li>NIST recommendations.<\/li>\n<\/ul>\n<p class=\"Standard\" style=\"text-align: justify; line-height: 150%;\">However, we are not limited solely to these. We treat each project individually and leverage our extensive experience, allowing us to identify system weaknesses that might not be detected if closed procedures were strictly followed. This enables us to effectively and reliably verify the security of your systems.  <\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243;][vc_custom_heading text_color=&#8221;color-jevc&#8221; heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]Penetration Test Process[\/vc_custom_heading][vc_column_text]The penetration testing service consists of several stages.<\/p>\n<ul>\n<li>The first is defining the scope of tests, which involves discussing the client&#8217;s needs, assisting in determining what is to be tested and how. It is also crucial to specify the method of test execution, i.e., whether it will be performed at the client&#8217;s premises, or remotely via the Internet or a VPN tunnel.  <\/li>\n<li>The second step is to conduct a preliminary analysis on our part and familiarize ourselves with the system under test, utilizing the information we possess about it.<\/li>\n<li>The third step is the strictly technical work, i.e., vulnerability identification. <\/li>\n<li>The next stage involves verifying and exploiting identified vulnerabilities.<br \/>\nThe final stage is the creation of a report containing detailed information about the test results.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243;][vc_custom_heading text_color=&#8221;color-jevc&#8221; heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]Report &#8211; Test Results[\/vc_custom_heading][vc_column_text]Upon completion of the penetration test, we generate a report designed to enable independent reproduction and verification of the system vulnerabilities we have identified. Each detected vulnerability is thoroughly described through a series of parameters, such as: <\/p>\n<ul>\n<li>vulnerability description,<\/li>\n<li>threat level,<\/li>\n<li>scoring of identified vulnerabilities using the CVSS standard,<\/li>\n<li>likelihood of exploitation by an intruder,<\/li>\n<li>impact on the tested system,<\/li>\n<\/ul>\n<p>Furthermore, the report includes a summary, allowing non-specialists to review the general conclusions and recommendations.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243;][vc_custom_heading text_color=&#8221;color-jevc&#8221; heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]Threat Elimination and Retesting[\/vc_custom_heading][vc_column_text]After delivering the final report to the Client, we are fully prepared to assist in eliminating identified vulnerabilities. We can provide support through consultations, help with reconfiguring systems or devices, and assist in implementing patches and additional security systems. Once the systems are ready, we can also conduct additional re-tests to verify that all issues have been effectively resolved.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-jevc&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_custom_heading separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]Security<\/p>\n<p>within the Organization[\/vc_custom_heading][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;3\/4&#8243;][vc_custom_heading text_color=&#8221;color-xsdn&#8221; heading_semantic=&#8221;h4&#8243; text_size=&#8221;h3&#8243; text_weight=&#8221;300&#8243; text_height=&#8221;fontheight-791337&#8243;]Standard penetration tests allow for the identification of vulnerabilities that can be exploited within IT systems. Our offer also includes Red Teaming services, which enable the identification of physical security issues.[\/vc_custom_heading][vc_button button_color=&#8221;color-204718&#8243; size=&#8221;btn-lg&#8221; hover_fx=&#8221;outlined&#8221; border_width=&#8221;0&#8243; width=&#8221;400&#8243; icon=&#8221;fa fa-chevron-right&#8221;]Explore our Red Teaming service[\/vc_button][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;0&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; font_family=&#8221;font-555555&#8243; overlay_alpha=&#8221;50&#8243; border_color=&#8221;color-jevc&#8221; border_style=&#8221;solid&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;2\/3&#8243;][vc_custom_heading text_color=&#8221;color-jevc&#8221; heading_semantic=&#8221;h4&#8243; text_size=&#8221;fontsize-916361&#8243; text_weight=&#8221;400&#8243; separator=&#8221;yes&#8221; separator_color=&#8221;yes&#8221;]Why Nordasys?[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h4&#8243; text_weight=&#8221;300&#8243; text_height=&#8221;fontheight-791337&#8243;]We possess many years of experience in providing these types of services. We have acquired this through performing nearly several hundred successful penetration tests for a range of Polish and international institutions in both the financial and IT sectors. We have also provided such services to government institutions. In addition to experience, we also hold a number of security testing certifications, including <strong>OSCP<\/strong> (<em>Offensive Security Certified Professional<\/em>), <strong>OSCE<\/strong> (<em>Offensive Security Certified Expert<\/em>), and <strong>ARES<\/strong> (<em>Advanced Reverse Engineering of Software<\/em>).[\/vc_custom_heading][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_single_image media=&#8221;87637&#8243; media_poster=&#8221;yes&#8221; media_width_percent=&#8221;70&#8243; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;2&#8243; bottom_padding=&#8221;2&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;0&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":87275,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-88077","page","type-page","status-publish","has-post-thumbnail","hentry","page_category-classic"],"_links":{"self":[{"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/pages\/88077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/comments?post=88077"}],"version-history":[{"count":6,"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/pages\/88077\/revisions"}],"predecessor-version":[{"id":88083,"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/pages\/88077\/revisions\/88083"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/media\/87275"}],"wp:attachment":[{"href":"https:\/\/www.nordasys.com\/en\/wp-json\/wp\/v2\/media?parent=88077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}