{"id":1362,"date":"2022-01-26T13:22:08","date_gmt":"2022-01-26T12:22:08","guid":{"rendered":"https:\/\/www.dsecbypass.com\/faq-frequently-asked-questions-information-security-lyon\/"},"modified":"2025-07-31T11:53:20","modified_gmt":"2025-07-31T09:53:20","slug":"faq-frequently-asked-questions-information-security-lyon","status":"publish","type":"page","link":"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/","title":{"rendered":"FAQ"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Hero Section&#8221; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;top&#8221; background_color_gradient_stops=&#8221;#2B2996 0%|#101535 50%&#8221; background_color_gradient_start=&#8221;#2B2996&#8243; background_color_gradient_end=&#8221;#101535&#8243; background_color_gradient_end_position=&#8221;50%&#8221; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_17.png&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_center&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; module_alignment=&#8221;center&#8221; custom_width_px=&#8221;700px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;Titillium Web||||||||&#8221; header_font_size=&#8221;66px&#8221; header_line_height=&#8221;1.5em&#8221; header_2_font=&#8221;Titillium Web||||||||&#8221; header_2_font_size=&#8221;66px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_font=&#8221;Titillium Web||||||||&#8221; header_3_font_size=&#8221;66px&#8221; header_3_line_height=&#8221;1.5em&#8221; header_4_font=&#8221;Titillium Web||||||||&#8221; header_4_font_size=&#8221;66px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font=&#8221;Titillium Web||||||||&#8221; header_5_font_size=&#8221;66px&#8221; header_5_line_height=&#8221;1.5em&#8221; header_6_font=&#8221;Titillium Web||||||||&#8221; header_6_font_size=&#8221;66px&#8221; header_6_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_text_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>F.A.Q<\/h1>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Passive reconnaissance phase&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;recon-passive&#8221; _builder_version=&#8221;4.17.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The auditor collects and uses public information in order to establish the cartography of the Information System, without direct interaction with the latter.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Active reconnaissance phase&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;recon-active&#8221; _builder_version=&#8221;4.17.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;100ms&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The pentester uses scanning techniques to actively discover exposed services and interfaces. This phase also makes it possible to validate the information collected passively.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Conduct of an audit&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;deroulement&#8221; _builder_version=&#8221;4.17.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">An initiation meeting makes it possible to identify the needs and scope of the mission, as well as any constraints.<\/p>\n<p style=\"text-align: justify;\">A legal mandate between the different parties is published in order to frame the audit service of DSecBypass.<\/p>\n<p style=\"text-align: justify;\">The consultant in charge of the mission can be reached at any time during its execution and informs the customer in the event of a critical discovery.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;What is pentesting, and what is it for?&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;deroulement&#8221; _builder_version=&#8221;4.27.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>A <strong data-start=\"374\" data-end=\"394\">penetration test<\/strong>, also known as a <strong data-start=\"409\" data-end=\"420\">pentest<\/strong>, is a controlled simulation of a computer attack designed to identify <strong data-start=\"498\" data-end=\"521\">security flaws<\/strong> in a system, network or web application.<br data-start=\"573\" data-end=\"576\">The aim is to detect and correct <strong data-start=\"619\" data-end=\"637\">vulnerabilities<\/strong> before a hacker can exploit them.<br data-start=\"681\" data-end=\"684\">Pentests enable companies to <strong data-start=\"727\" data-end=\"759\">strengthen their cybersecurity<\/strong>, comply with <strong data-start=\"778\" data-end=\"803\">regulatory standards<\/strong> (RGPD, ISO 27001, PCI-DSS, DORA, NIS2) and protect their sensitive data. It&#8217;s also a good way of <strong>increasing the cyber maturity<\/strong> of technical teams by involving them in restitutions. <\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;What&#039;s the difference between a black-box, gray-box and white-box penetration test?&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;deroulement&#8221; _builder_version=&#8221;4.27.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p data-start=\"304\" data-end=\"511\">In <strong data-start=\"307\" data-end=\"324\">cybersecurity<\/strong>, the methodology of a <a href=\"https:\/\/www.dsecbypass.com\/en\/penetration-tests-pentest-security-audits-lyon\/\" title=\"Our penetration tests\"><strong data-start=\"347\" data-end=\"367\">penetration test<\/strong><\/a> (or <strong data-start=\"372\" data-end=\"383\">pentest<\/strong>) can vary according to the amount of information provided to the auditor prior to the audit. There are three main approaches: <\/p>\n<ul data-start=\"513\" data-end=\"1700\">\n<li data-start=\"513\" data-end=\"876\">\n<p data-start=\"516\" data-end=\"553\"><strong data-start=\"516\" data-end=\"551\">Black Box testing<\/strong><\/p>\n<ul data-start=\"557\" data-end=\"876\">\n<li data-start=\"557\" data-end=\"638\">\n<p data-start=\"559\" data-end=\"638\">The pentester receives <strong data-start=\"582\" data-end=\"614\">no prior information<\/strong> about the targeted system.<\/p>\n<\/li>\n<li data-start=\"642\" data-end=\"747\">\n<p data-start=\"644\" data-end=\"747\">The audit simulates a <strong data-start=\"663\" data-end=\"689\">real external attack<\/strong>, carried out by a hacker who discovers everything for himself.<\/p>\n<\/li>\n<li data-start=\"751\" data-end=\"876\">\n<p data-start=\"753\" data-end=\"876\">Objective: to assess the <strong data-start=\"775\" data-end=\"821\">resistance of systems exposed to the Internet<\/strong> and measure the risk of intrusion without internal access.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"878\" data-end=\"1287\">\n<p data-start=\"881\" data-end=\"917\"><strong data-start=\"881\" data-end=\"915\">Grey Box test<\/strong><\/p>\n<ul data-start=\"921\" data-end=\"1287\">\n<li data-start=\"921\" data-end=\"1034\">\n<p data-start=\"923\" data-end=\"1034\">The pentester has<strong data-start=\"946\" data-end=\"973\">partial information<\/strong> (limited user access, network diagrams, documentation).<\/p>\n<\/li>\n<li data-start=\"1038\" data-end=\"1164\">\n<p data-start=\"1040\" data-end=\"1164\">The audit simulates an <strong data-start=\"1058\" data-end=\"1104\">attacker who already has limited access<\/strong> or internal information, such as a malicious employee.<\/p>\n<\/li>\n<li data-start=\"1168\" data-end=\"1287\">\n<p data-start=\"1170\" data-end=\"1287\">Objective: to verify <strong data-start=\"1193\" data-end=\"1213\">internal security<\/strong> and the ability to contain an attack in the event of an initial compromise.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1289\" data-end=\"1700\">\n<p data-start=\"1292\" data-end=\"1331\"><strong data-start=\"1292\" data-end=\"1329\">White box test<\/strong><\/p>\n<ul data-start=\"1335\" data-end=\"1700\">\n<li data-start=\"1335\" data-end=\"1458\">\n<p data-start=\"1337\" data-end=\"1458\">The pentester has <strong data-start=\"1352\" data-end=\"1372\">full access<\/strong> to all information: source codes, configurations, administrator accounts.<\/p>\n<\/li>\n<li data-start=\"1462\" data-end=\"1587\">\n<p data-start=\"1464\" data-end=\"1587\">The audit is <strong data-start=\"1476\" data-end=\"1489\">exhaustive<\/strong>, enabling the detection of <strong data-start=\"1518\" data-end=\"1546\">deep-seated vulnerabilities<\/strong> invisible in a more limited test.<\/p>\n<\/li>\n<li data-start=\"1591\" data-end=\"1700\">\n<p data-start=\"1593\" data-end=\"1700\">Objective: carry out a <strong data-start=\"1616\" data-end=\"1633\">complete<\/strong> security <strong data-start=\"1616\" data-end=\"1633\">audit<\/strong> for accurate diagnosis and rapid remediation.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Penetration testing methodologies&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;methodologie&#8221; _builder_version=&#8221;4.17.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The work of the auditors is based on the following public and internal standards :<\/p>\n<ul>\n<li style=\"text-align: justify;\">Good practices specific to the technologies encountered<\/li>\n<li style=\"text-align: justify;\">TOP10 OWASP and OWASP ASVS<\/li>\n<li style=\"text-align: justify;\">SANS Top 20 critical controls<\/li>\n<li style=\"text-align: justify;\">Guides and best practices from ANSSI<\/li>\n<li style=\"text-align: justify;\">DSecBypass Expertise<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Why perform a pentest?&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;pourquoi-pentest&#8221; _builder_version=&#8221;4.17.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;250ms&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The pentest is complementary and essential to the security measures already implemented in the Information System. It makes it possible to validate the security of the audited perimeter from an offensive point of view.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Deliverables&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;livrables&#8221; _builder_version=&#8221;4.17.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;100ms&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The report includes a summary of the results as well as the details of the vulnerabilities (CVSS score, impact, references) and recommendations identified.<\/p>\n<p style=\"text-align: justify;\">The optional technical restitution is an opportunity for the consultant to present his approach and his results in an interactive way, and to discuss with the client and his teams on the action plan to be implemented.<\/p>\n<p style=\"text-align: justify;\">Also on option, a managerial restitution makes it possible to address an executive audience.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;What&#039;s the difference between internal and external penetration testing?&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;livrables&#8221; _builder_version=&#8221;4.27.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;100ms&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li data-start=\"956\" data-end=\"1168\">\n<p data-start=\"958\" data-end=\"1168\"><a href=\"https:\/\/www.dsecbypass.com\/en\/external-pentest\/\" title=\"External Pentest\"><strong data-start=\"958\" data-end=\"986\">External penetration test<\/strong><\/a> Carried out from the Internet, it simulates an attack by an external cybercriminal. It evaluates <strong data-start=\"1075\" data-end=\"1100\">perimeter security<\/strong> (web servers, firewalls, web-accessible applications). <\/p>\n<\/li>\n<li data-start=\"1169\" data-end=\"1455\">\n<p data-start=\"1171\" data-end=\"1455\"><a href=\"https:\/\/www.dsecbypass.com\/en\/internal-pentest\/\" title=\"Internal Pentest\"><strong data-start=\"1171\" data-end=\"1199\">Internal intrusion test<\/strong><\/a> Carried out from inside the network, it simulates a malicious employee or an intruder who already has physical or logical access. It can also be carried out from the Internet with nomadic access, to simulate the compromise of a remote access.<br data-start=\"1326\" data-end=\"1329\">The two approaches complement each other to obtain a complete view of the <strong data-start=\"1408\" data-end=\"1429\">attack surface<\/strong> and the <strong data-start=\"1437\" data-end=\"1454\">real risks<\/strong>. <\/p>\n<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Is a penetration test legal in France?&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x75;||divi||400&#8243; icon_color=&#8221;#3C3CC8&#8243; icon_placement=&#8221;left&#8221; module_id=&#8221;livrables&#8221; _builder_version=&#8221;4.27.4&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#1b1f50&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||12%|&#8221; custom_margin_tablet=&#8221;70px|||&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;30px|25px|30px|16px|false|false&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;100ms&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Yes, provided it is <strong data-start=\"3274\" data-end=\"3286\">authorized<\/strong> and governed by a <strong data-start=\"3305\" data-end=\"3322\">contract signed<\/strong> between the service provider and the customer.<br data-start=\"3357\" data-end=\"3360\">Unauthorized pentesting is a <strong data-start=\"3398\" data-end=\"3419\">criminal offence<\/strong> (article 323-1 of the French Penal Code).<br data-start=\"3450\" data-end=\"3453\">Companies must therefore ensure that the test is carried out by a <strong data-start=\"3524\" data-end=\"3548\">qualified service provider<\/strong>, in compliance with current legislation and standards.<\/p>\n<p>DSecBypass systematically issues a mandate, an additional document that provides a legal framework for presales.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>F.A.Q &nbsp;The auditor collects and uses public information in order to establish the cartography of the Information System, without direct interaction with the latter.The pentester uses scanning techniques to actively discover exposed services and interfaces. This phase also makes it possible to validate the information collected passively.An initiation meeting makes it possible to identify the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1362","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1362"}],"version-history":[{"count":26,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1362\/revisions"}],"predecessor-version":[{"id":3795,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1362\/revisions\/3795"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}