top of page
Kali

Penetration Testing - Black Box

Real-world attack simulation

1 da 16 hr
On Quotes
Montpellier, Occitanie, France

Service Description

Penetration Testing Without Prior Knowledge of the System In-depth testing of your system, business domain, and any direct or indirect connections associated with it. The goal is to determine whether it is possible to breach your corporate system and identify any vulnerabilities or points of access to your business data. This identifies the vulnerabilities your company faces. In other words, the process involves adopting the perspective of a “hacker” to identify exploitable pathways during a targeted attack on the system or network, which could allow for takeover or access to corporate data. These tests are conducted using the Black Box method. Various levels can be tailored based on the company’s specific requirements and objectives. (Targeted). The various tests are preceded by an in-depth analysis. The testing phase includes multiple attack vectors to identify potential access points. Service Details: This involves analysis, research, and testing conducted over a period of 7 to 10 days. Additional work will be performed to prepare a detailed report, which will be provided to you no later than 72 hours afterward. Duration: The total duration of the project is 10 days. Pricing: Pricing is determined solely based on a quote tailored to the network being analyzed, and is primarily intended for freelancers, non-profits, and very small businesses. (If travel is required, the associated costs will be included in the quote) Quotes: Any quote provided that is not followed by an agreement is subject to a fee to cover the cost of the initial research (€50). Payment: A deposit of 30% of the total price is required to cover the initial cost of the work to be performed. Final reports and analysis materials will be provided only after full payment has been received. Confidentiality: A service agreement and a data access authorization form will be sent to you in advance, detailing the terms and conditions, the need for your cooperation, and the confidentiality obligation, so that we may work on your system in full compliance with the law. Service Policy: This service falls under the scope of cybersecurity analysis and is not limited to basic IT troubleshooting. Specialized cybersecurity services. Accepted payment methods: Bank transfer. (If you prefer other methods, please let me know.)


Cancellation Policy

To cancel or reschedule a reservation, please notify us at least 24 hours in advance. Specialized cybersecurity services – excluding standard IT support.


Contact Details

  • Montpellier, Occitanie, France


Pro Sécurité
Referenced on Cybermalveillance.gouv.fr

AOS IT Solutions

- Optimized analysis & security -

CYBERSECURITY

( SACD - INPI )

Ceh_Hall_Of_Fame2025

©2023 by AOS Solution Informatique. Created with Wix.com

TOP 100 LEADERS OF ETHICAL HACKING COMMUNITY

Terms and Conditions of Use

Legal Notice

Privacy Policy

Terms and Conditions of Sale

bottom of page