{"id":1445,"date":"2021-02-27T15:05:22","date_gmt":"2021-02-27T14:05:22","guid":{"rendered":"https:\/\/www.dsecbypass.com\/external-pentest\/"},"modified":"2024-07-19T09:53:17","modified_gmt":"2024-07-19T07:53:17","slug":"external-pentest","status":"publish","type":"page","link":"https:\/\/www.dsecbypass.com\/en\/external-pentest\/","title":{"rendered":"External Penetration Test"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; next_background_color=&#8221;#101535&#8243; admin_label=&#8221;Hero Section&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#101535&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#3d3fc7 0%|rgba(61,63,199,0) 100%&#8221; background_color_gradient_start=&#8221;#3d3fc7&#8243; background_color_gradient_end=&#8221;rgba(61,63,199,0)&#8221; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; parallax=&#8221;on&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;||0px||false|false&#8221; bottom_divider_style=&#8221;curve2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;External pentest&#8221; text_orientation=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; title_font=&#8221;Titillium Web||||||||&#8221; title_font_size=&#8221;66px&#8221; title_line_height=&#8221;1.5em&#8221; content_font=&#8221;||||||||&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;2em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(16,21,53,0) 50%|#101535 100%&#8221; background_color_gradient_start=&#8221;rgba(16,21,53,0)&#8221; background_color_gradient_start_position=&#8221;50%&#8221; background_color_gradient_end=&#8221;#101535&#8243; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;13px&#8221; button_one_text_color=&#8221;#4328b7&#8243; button_one_bg_color=&#8221;#ffffff&#8221; button_one_border_width=&#8221;10px&#8221; button_one_border_color=&#8221;#ffffff&#8221; button_one_border_radius=&#8221;0px&#8221; button_one_letter_spacing=&#8221;2px&#8221; button_one_font=&#8221;Titillium Web|700||on|||||&#8221; custom_button_two=&#8221;on&#8221; button_two_text_size=&#8221;13px&#8221; button_two_text_color=&#8221;#4328b7&#8243; button_two_bg_color=&#8221;#ffffff&#8221; button_two_border_width=&#8221;10px&#8221; button_two_border_color=&#8221;#ffffff&#8221; button_two_border_radius=&#8221;0px&#8221; button_two_letter_spacing=&#8221;2px&#8221; button_two_font=&#8221;Titillium Web|700||on|||||&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|||&#8221; child_filter_blur=&#8221;-2px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_intensity_slide=&#8221;2%&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;40px&#8221; title_font_size_phone=&#8221;&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; content_font_size_phone=&#8221;15px&#8221; content_font_size_last_edited=&#8221;on|phone&#8221; title_text_shadow_style=&#8221;preset3&#8243; border_radii_image=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style_image=&#8221;preset6&#8243; button_one_letter_spacing_hover=&#8221;2px&#8221; button_two_letter_spacing_hover=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;2px&#8221; button_two_letter_spacing__hover_enabled=&#8221;on&#8221; button_two_letter_spacing__hover=&#8221;2px&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_one_text__hover_enabled=&#8221;off|desktop&#8221; child_filter_hue_rotate__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Description 2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_starting_opacity=&#8221;2%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span> <\/span><\/p>\n<p id=\"pentest-d-une-ou-plusieurs-applications-web\" style=\"text-align: justify;\">It is an<span> <\/span><strong>external pentest<\/strong>, on all or part of your Information System exposed to the Internet. This<span> <\/span><strong>audit<\/strong><span> <\/span>is usually carried out as a \u00ab <strong>blackbox<\/strong> \u00bb <em>assessment<\/em>.<\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;|||30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Customer-owned open services (SSH, RDP, MySQL, Bucket S3, ElasticSearch, etc.)<\/li>\n<li style=\"text-align: justify;\">Webserver security (Apache, Nginx, IIS\u2026)<\/li>\n<li style=\"text-align: justify;\">Exploitation of configuration defects<\/li>\n<li style=\"text-align: justify;\">Search for vulnerabilities on components (exploitation of known vulnerabilities or 0day)<\/li>\n<\/ul>\n<ol style=\"text-align: justify;\"><\/ol>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/Global_network_v1.png&#8221; alt=&#8221;Vecteezy.com&#8221; title_text=&#8221;External pentest&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;40px|||||&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Phases&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto-bg-04.png&#8221; background_size=&#8221;initial&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#191d52&#8243; custom_padding=&#8221;|0px||||&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"description-de-l-offre-test-d-intrusion-site-web\">The audit is carried out in several phases<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf6fa;||fa||900&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;18px&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/#recon-passive\" target=\"_blank\" rel=\"noopener\" title=\"Description of passive reconnaissance in pentest\">Passive reconnaissance<\/a> (consolidation of the attack surface, information gathering)<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf519;||fa||900&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/#recon-active\" title=\"Description of active reconnaissance in pentest\" target=\"_blank\" rel=\"noopener\">Active reconnaissance<\/a> (identification of accessible services)<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf780;||fa||900&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Identification and exploitation of vulnerabilities<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf82f;||fa||900&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Determination of the real impact of flaws<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe059;||divi||400&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;25px&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/#livrables\" target=\"_blank\" rel=\"noopener\" title=\"Description of DSecBypass audit deliverables\">Deliverables<\/a> writing<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Use Cases&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;0px|||||&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"dans-quels-cas-choisir-l-audit-de-site-web\">In which cases to choose the external intrusion test?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||16px|false|false&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf0a1;||fa||900&#8243; icon_width=&#8221;130px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;|16px||16px|false|false&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Have the same vision as an external attacker.<\/p>\n<p style=\"text-align: justify;\">Ensure filtering and external access policies are implemented and robust.<\/p>\n<p style=\"text-align: justify;\">Test the security of the Information System against a motivated external attacker (manual analysis).<\/p>\n<p style=\"text-align: justify;\">Discover the adventures of Jean le pentester on <a href=\"https:\/\/www.dsecbypass.com\/en\/pentest-stories-external\/\" title=\"Procedure and results of a fictious external pentest in Lyon\">an external intrusion test<\/a> for a more colorful description.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Modalites&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"modalites-de-la-prestation\">Mission organization<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|16px||16px|false|true&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">An initiation meeting makes it possible to identify the needs and scope of the mission, as well as any constraints.<\/p>\n<p style=\"text-align: justify;\">A legal mandate between the different parties is published in order to supervise <strong>DSecBypass<\/strong>&#8216;<span>s<\/span> audit service.<\/p>\n<p style=\"text-align: justify;\">The consultant in charge of the mission can be reached at any time during its execution and informs the customer in the event of a critical discovery.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#x67;||divi||400&#8243; icon_width=&#8221;150px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Results&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"resultats-du-test-d-intrusion\">Penetration test results<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|16px||16px|false|true&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf681;||fa||900&#8243; icon_width=&#8221;150px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The deliverables of the mission include a report as well as two optional restitutions.<\/p>\n<p style=\"text-align: justify;\">The report includes a summary of the results as well as the details of the identified vulnerabilities and recommendations.<\/p>\n<p style=\"text-align: justify;\">The technical restitution is an opportunity for the consultant to present his approach and his results in an interactive way, and to discuss with the client and his teams on the action plan. Managerial restitution makes it possible to address an executive audience.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#101535&#8243; admin_label=&#8221;Contact&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#12163d 0%|#2b2996 100%&#8221; background_color_gradient_start=&#8221;#12163d&#8221; background_color_gradient_end=&#8221;#2b2996&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto_illustration_11.png&#8221; parallax=&#8221;on&#8221; top_divider_style=&#8221;arrow2&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8221; button_text=&#8221;Contact us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is an external pentest, on all or part of your Information System exposed to the Internet. This audit is usually carried out as a \u00ab blackbox \u00bb assessment. Customer-owned open services (SSH, RDP, MySQL, Bucket S3, ElasticSearch, etc.) Webserver security (Apache, Nginx, IIS\u2026) Exploitation of configuration defects Search for vulnerabilities on components (exploitation of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1196,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1445","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1445"}],"version-history":[{"count":27,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1445\/revisions"}],"predecessor-version":[{"id":3518,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1445\/revisions\/3518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media\/1196"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}