1. Determine the scope of penetration test. 2. Draw up the penetration test scheme. 3. Implementation of penetration test. 4. Project delivery and acceptance. And ensure that every step of the operation is security and traceable.
Conduct manual confirmation and analysis of threat vulnerabilities detected by penetration test and provide the solutions for vulnerabilities. In the case of ensuring that the normal business is not affected, cooperate with the user to implement the reinforcement scheme.
Carry out penetration test verification of the reinforced system to ensure the unavailability of the vulnerability, and verify the effectiveness of the security reinforcement measures. Provide users with professional penetration test acceptance report to ensure the safety and stability of user’s business.
Scan, feedback the current page