We conduct the following core tests as part of our Penetration Test services:
• Attempt to gain access to the target systems through the vulnerabilities discovered earlier
• Escalate Privilege - Upon successful access to vulnerable systems, attempt to gain full administrative control of the system or device on as required basis. Privilege escalation will be done with approval from the client.
• Capture evidence which may be in the form of screen shots, logs, etc.
• Document the findings.