{"id":1439,"date":"2021-02-27T15:08:00","date_gmt":"2021-02-27T14:08:00","guid":{"rendered":"https:\/\/www.dsecbypass.com\/website-pentest\/"},"modified":"2024-07-19T09:57:47","modified_gmt":"2024-07-19T07:57:47","slug":"website-pentest","status":"publish","type":"page","link":"https:\/\/www.dsecbypass.com\/en\/website-pentest\/","title":{"rendered":"Web Penetration Test"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; next_background_color=&#8221;#101535&#8243; admin_label=&#8221;Hero Section&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#101535&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#3d3fc7 0%|rgba(61,63,199,0) 100%&#8221; background_color_gradient_start=&#8221;#3d3fc7&#8243; background_color_gradient_end=&#8221;rgba(61,63,199,0)&#8221; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; parallax=&#8221;on&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;||0px||false|false&#8221; bottom_divider_style=&#8221;mountains&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;Website Pentest&#8221; text_orientation=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; title_font=&#8221;Titillium Web||||||||&#8221; title_font_size=&#8221;66px&#8221; title_line_height=&#8221;1.5em&#8221; content_font=&#8221;||||||||&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;2em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(16,21,53,0) 50%|#101535 100%&#8221; background_color_gradient_start=&#8221;rgba(16,21,53,0)&#8221; background_color_gradient_start_position=&#8221;50%&#8221; background_color_gradient_end=&#8221;#101535&#8243; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;13px&#8221; button_one_text_color=&#8221;#4328b7&#8243; button_one_bg_color=&#8221;#ffffff&#8221; button_one_border_width=&#8221;10px&#8221; button_one_border_color=&#8221;#ffffff&#8221; button_one_border_radius=&#8221;0px&#8221; button_one_letter_spacing=&#8221;2px&#8221; button_one_font=&#8221;Titillium Web|700||on|||||&#8221; custom_button_two=&#8221;on&#8221; button_two_text_size=&#8221;13px&#8221; button_two_text_color=&#8221;#4328b7&#8243; button_two_bg_color=&#8221;#ffffff&#8221; button_two_border_width=&#8221;10px&#8221; button_two_border_color=&#8221;#ffffff&#8221; button_two_border_radius=&#8221;0px&#8221; button_two_letter_spacing=&#8221;2px&#8221; button_two_font=&#8221;Titillium Web|700||on|||||&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|||&#8221; child_filter_blur=&#8221;-2px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_intensity_slide=&#8221;2%&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;40px&#8221; title_font_size_phone=&#8221;&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; content_font_size_phone=&#8221;15px&#8221; content_font_size_last_edited=&#8221;on|phone&#8221; title_text_shadow_style=&#8221;preset3&#8243; border_radii_image=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style_image=&#8221;preset6&#8243; button_one_letter_spacing_hover=&#8221;2px&#8221; button_two_letter_spacing_hover=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;2px&#8221; button_two_letter_spacing__hover_enabled=&#8221;on&#8221; button_two_letter_spacing__hover=&#8221;2px&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_one_text__hover_enabled=&#8221;off|desktop&#8221; child_filter_hue_rotate__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Description 2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_starting_opacity=&#8221;2%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span> <\/span><br \/><span> <\/span><\/p>\n<p id=\"pentest-d-une-ou-plusieurs-applications-web\">A pentest carried out on one or more web applications.<\/p>\n<p>The auditor tests the security of the various technological bricks:<\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;|||30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>Web server security audit<\/strong><\/li>\n<li style=\"text-align: justify;\"><strong>Security misconfigurations<\/strong><span> <\/span>of the CMS or framework used<\/li>\n<li style=\"text-align: justify;\"><strong>Vulnerability research<\/strong><span> <\/span>on components (with known exploits or 0day)<\/li>\n<li style=\"text-align: justify;\">Exploitation of <strong>TOP 10 OWASP type vulnerabilities<\/strong> on the web application<\/li>\n<\/ul>\n<ol style=\"text-align: justify;\"><\/ol>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/audit_web_v1.png&#8221; alt=&#8221;Bleu vecteur cr\u00e9\u00e9 par vectorjuice &#8211; fr.freepik.com&#8221; title_text=&#8221;Website security audit&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Phases&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto-bg-04.png&#8221; background_size=&#8221;initial&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#191d52&#8243; custom_padding=&#8221;|0px||||&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"description-de-l-offre-test-d-intrusion-site-web\">The audit is carried out in several phases<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf6fa;||fa||900&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;18px&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/#recon-passive\" target=\"_blank\" rel=\"noopener\" title=\"Description of passive reconnaissance in pentest\">Passive reconnaissance<\/a> (consolidation of the attack surface, information gathering)<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf519;||fa||900&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/#recon-active\" title=\"Description of active reconnaissance in pentest\" target=\"_blank\" rel=\"noopener\">Active reconnaissance<\/a> (identification of accessible services)<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf780;||fa||900&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Identification and exploitation of vulnerabilities<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf82f;||fa||900&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Determination of the real impact of flaws<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe059;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/#livrables\" target=\"_blank\" rel=\"noopener\" title=\"Description of DSecBypass audit deliverables\">Deliverables<\/a> writing<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Types de scenarios&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#101535&#8243; custom_padding=&#8221;0px||0px||true|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span>Different <\/span><span>penetration testing <\/span><span>scenarios exist<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_width_px=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Black box&#8221; image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/Crypto_Icon_13.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(60,60,200,0.2)&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;30px|16px|30px|16px&#8221; animation_style=&#8221;fold&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328B7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<span>The auditor only has information about the scope of the mission.<\/span><br \/>\n<span>&nbsp;<\/span><br \/>\n<span>&nbsp;<\/span><br \/>\n<span>&nbsp;<\/span>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Grey box&#8221; image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/Crypto_Icon_13.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(60,60,200,0.2)&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;30px|16px|30px|16px&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;300ms&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328B7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The auditor is assigned one or more accounts on the application to evaluate the permission model and test feature benefits.<\/span><br \/><span> <\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;White box&#8221; image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/Crypto_Icon_13.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(60,60,200,0.2)&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;30px|16px|30px|16px&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;200ms&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328B7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The auditor has as much information and access to the application and its infrastructure as possible in order to be as exhaustive as possible in the search for vulnerabilities.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Use Cases&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"dans-quels-cas-choisir-l-audit-de-site-web\">In which cases to choose the intrusion test of website?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||16px|false|false&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf0a1;||fa||900&#8243; icon_width=&#8221;130px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;|16px||16px|false|false&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Assess the security level of a website.<\/p>\n<p style=\"text-align: justify;\">Validate that the new functionalities developed or a new version of the website are in line with the standards and good practices of secure development.<\/p>\n<p style=\"text-align: justify;\">Make sure there are no leaks of personal information.<\/p>\n<p style=\"text-align: justify;\">Audit the permissions model between different accounts that may have different privilege levels.<\/p>\n<p style=\"text-align: justify;\">Discover the adventures of Jean le pentester on <a href=\"https:\/\/www.dsecbypass.com\/en\/pentest-stories-the-website\/\" title=\"Procedure and results of a fictious website pentest in Lyon\">a website intrusion test<\/a> for a more colorful description.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Modalites&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"modalites-de-la-prestation\">Mission organization<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|16px||16px|false|true&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">An initiation meeting makes it possible to identify the needs and scope of the mission, as well as any constraints.<\/p>\n<p style=\"text-align: justify;\">A legal mandate between the different parties is published in order to supervise <strong>DSecBypass<\/strong>&#8216;<span>s<\/span> audit service.<\/p>\n<p style=\"text-align: justify;\">The consultant in charge of the mission can be reached at any time during its execution and informs the customer in the event of a critical discovery.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#x67;||divi||400&#8243; icon_width=&#8221;150px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Results&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"resultats-du-test-d-intrusion\">Penetration test results<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|16px||16px|false|true&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf681;||fa||900&#8243; icon_width=&#8221;150px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The deliverables of the mission include a report as well as two optional restitutions.<\/p>\n<p style=\"text-align: justify;\">The report includes a summary of the results as well as the details of the identified vulnerabilities and recommendations.<\/p>\n<p style=\"text-align: justify;\">The technical restitution is an opportunity for the consultant to present his approach and his results in an interactive way, and to discuss with the client and his teams on the action plan. Managerial restitution makes it possible to address an executive audience.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#101535&#8243; admin_label=&#8221;Contact&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#12163d 0%|#2b2996 100%&#8221; background_color_gradient_start=&#8221;#12163d&#8221; background_color_gradient_end=&#8221;#2b2996&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; parallax=&#8221;on&#8221; top_divider_style=&#8221;arrow2&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8221; button_text=&#8221;Contact us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A pentest carried out on one or more web applications. The auditor tests the security of the various technological bricks: Web server security audit Security misconfigurations of the CMS or framework used Vulnerability research on components (with known exploits or 0day) Exploitation of TOP 10 OWASP type vulnerabilities on the web application The audit is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1199,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1439","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1439"}],"version-history":[{"count":39,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1439\/revisions"}],"predecessor-version":[{"id":3540,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1439\/revisions\/3540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media\/1199"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}