Vietnamese Network Security Joint Stock Company (VSEC) was officially established in 2009 but has already had nearly 20 years of experience in the Information Security industry.
In 2021, facing the changes in the economy due to the impact of the Covid pandemic and the trend of digital transformation in general, VSEC decided to launch a new brand identity that reflects its image and core values.
- What is Penetration Testing?
- Why should we conduct the Penetration test?
- How is Penetration Test different from vulnerability scanning tools?
- How long does it take to perform a Penetration Test?
- The negative effects of the vulnerability screening tools and how to avoid them
Penetration testing, also known as “pentest,” is a method or tests to assess the security level of an organization. The tests are carried out within an acceptable range, simulating the attack scenarios of unauthorized attackers. When a security vulnerability is discovered, privilege escalation techniques will be used to gain access to confidential information, personal information, financial data, intellectual property or any other sensitive information. After performing the pentest, the experts will issue a report detailing the method of exploiting the security vulnerability and recommending patching the vulnerability. This will reduce the risk to the system.
Most of the standards in the world today require a pentest to be performed on the system. Pentest can identify vulnerabilities that accidentally appear during changes to the system’s environment such as system upgrades or reconfigurations. Pentest needs to be integrated into the software development process to prevent vulnerabilities from occurring during the development phase. From a customer’s perspective, organizations that have applied pentest measures will have a greater reputation and commitment to securely storing customers’ personal data. Pentest helps assess the security level of companies and organizations that are about to be acquired. Pentest will assist the organization to evaluate both emerging vulnerabilities or vulnerabilities that have not been publicly disclosed. It is very important to conduct the pentest right at the software development stage because it will minimize security vulnerabilities and make it much simpler to patch and restore.
Both Pentest and automated system scanning tools bring benefits to the system. Although these are different methods, they should complement each other and both should be implemented. Automated scanning tools will be low cost and effective for common vulnerabilities such as misconfiguration, missing patches and some others. However, there will be false discovery rates and they do not fully define the extent of impact when exploited. Different from automated tools, pentest, an application penetration testing specialist, will have a more comprehensive view of the system. Pentest tools are mainly tools that assist experts in gathering information or exploiting some components. Pentest will be performed by experts to analyze workflows, transactions, demonstrate privilege escalation and access to sensitive organizational information.
The time to perform pentest depends on the complexity and size of the system, including the planning, the scope of the pentest. After the pentest is done, there will be a report and discussion to patch the vulnerability. The larger the system, the more manpower and time it requires. Nevertheless, it is estimated that it will take from 4 to 6 weeks to complete a pentest process. If the system is too complex, we should divide it into several stages.
In short, when doing a scanning, the scanning system can have some minor effects on your website. However, we need to accept some of those influences to find vulnerabilities as if those vulnerabilities are discovered by hackers, it is likely that your website will be damaged much more heavily.
Partners and customers can contact us directly via the following channels:
Security support: email@example.com
Business Support: firstname.lastname@example.org
Marketing & Communication: email@example.com
Hotline: 1800 2056