{"id":10898,"date":"2017-08-17T08:00:51","date_gmt":"2017-08-17T12:00:51","guid":{"rendered":"https:\/\/www.smprotection.com\/?page_id=10898\/"},"modified":"2017-08-17T08:00:51","modified_gmt":"2017-08-17T12:00:51","slug":"pen-test","status":"publish","type":"page","link":"https:\/\/www.smprotection.com\/en\/pen-test\/","title":{"rendered":"Pen test"},"content":{"rendered":"<p>[vc_row row_type=&#8221;2&#8243; blox_height=&#8221;270&#8243; blox_image=&#8221;7633&#8243; blox_cover=&#8221;false&#8221; blox_dark=&#8221;true&#8221;][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;10\/12&#8243;]<hr class=\"vertical-space5\">[vc_column_text]<\/p>\n<h4 style=\"font-size: 75px; margin-bottom: 0;\"><strong>Pen test<\/strong><\/h4>\n<p>[\/vc_column_text]<hr class=\"vertical-space5\"><hr class=\"vertical-space5\">[\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;left-to-right&#8221;]SM Protection offers thorough pen test services by \u201cblack box\u201d (with no knowledge of your system and network configuration), &#8220;semi-black box&#8221; (with limited knowledge of your system and network configuration), and in &#8220;white box&#8221; (with a good knowledge of your system and network configuration). The purpose of these tests is to assess the level of security and validate the maturity of your applications, systems, or network (wired and wireless), from malicious attacks from the Internet, WiFi or the internal network of your company.<\/p>\n<p><strong>For a given test scope, in addition to the applications concerned, we will also evaluate the system configurations on which these applications are based and their interactions with other systems and applications connected by services or data exchange links.<\/strong><\/p>\n<p>At the end of the penetration tests, a report will be provided, detailing the faults found, details of how we have exploited them and possible solutions will be provided in addition to our recommendations on improving the architecture of your systems if necessary. The faults found will be ranked from the most critical to the least critical.<\/p>\n<p>We offer a world-class service that respects the professional ethics of this industry. We are willing to sign any non-disclosure and confidentiality agreement on the information that will be in our possession through the penetration tests.<\/p>\n<p><strong>The top 10 most critical web application security risks according to OWASP for 2017 are:<\/strong><\/p>\n<p><strong>\u00a0<\/strong>A1 SQL Injection<\/p>\n<p>A2 Broken authentication and session management<\/p>\n<p>A3 Cross-Site Scripting (XSS)<\/p>\n<p>A4 Brocken Access Control<\/p>\n<p>A5 Security Misconfiguration<\/p>\n<p>A6 Sensitive Data exposure<\/p>\n<p>A7 Insufficient Attack Protection (New)<\/p>\n<p>A8 Cross-site Request Forgery (CSRF)<\/p>\n<p>A9 Using Components with Known Vulnerability<\/p>\n<p>A10 Under protected APIs (New)<\/p>\n<p><strong>\u00a0<\/strong>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row row_type=&#8221;2&#8243; blox_height=&#8221;270&#8243; blox_image=&#8221;7633&#8243; blox_cover=&#8221;false&#8221; blox_dark=&#8221;true&#8221;][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;10\/12&#8243;][vc_column_text] Pen test [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;left-to-right&#8221;]SM Protection offers thorough pen test services by \u201cblack box\u201d (with no knowledge of your system and network configuration), &#8220;semi-black box&#8221; (with limited knowledge of your system and network configuration), and in &#8220;white box&#8221; (with a good knowledge of your system and network configuration). The purpose of these tests is to assess the level of security and validate the maturity of your applications, systems, or network (wired and wireless), from malicious attacks from the Internet, WiFi or the internal network of your company. For a given test scope, in addition to the applications concerned, we will also evaluate the system configurations on which these applications are based and their interactions with other systems and applications connected by services or data exchange links. At the end of the penetration tests, a report will be provided, detailing the faults found, details of how we have exploited them and possible solutions will be provided in addition to our recommendations on improving the architecture of your systems if necessary. The faults found will be ranked from the most critical to the least critical. We offer a world-class service that respects the professional ethics of this industry. We are willing to sign any non-disclosure and confidentiality agreement on the information that will be in our possession through the penetration tests. The top 10 most critical web application security risks according to OWASP for 2017 are: \u00a0A1 SQL Injection A2 Broken authentication and session management A3 Cross-Site Scripting (XSS) A4 Brocken Access Control A5 Security Misconfiguration A6 Sensitive Data exposure A7 Insufficient Attack Protection (New) A8 Cross-site Request Forgery (CSRF) A9 Using Components with Known Vulnerability A10 Under protected APIs (New) \u00a0[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10898","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.smprotection.com\/en\/wp-json\/wp\/v2\/pages\/10898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smprotection.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.smprotection.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.smprotection.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smprotection.com\/en\/wp-json\/wp\/v2\/comments?post=10898"}],"version-history":[{"count":1,"href":"https:\/\/www.smprotection.com\/en\/wp-json\/wp\/v2\/pages\/10898\/revisions"}],"predecessor-version":[{"id":10900,"href":"https:\/\/www.smprotection.com\/en\/wp-json\/wp\/v2\/pages\/10898\/revisions\/10900"}],"wp:attachment":[{"href":"https:\/\/www.smprotection.com\/en\/wp-json\/wp\/v2\/media?parent=10898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}