Product launched? Then it’s pentest time!

When hackers are on your side

Pentest checklist: what you might have missed

  • IT infrastructure (cloud or local)
  • database management structure
  • network equipment and services
  • operating systems for servers and users
  • tools to protect corporate information
  • third-party software
  • etc.
  • how and when the system was attacked
  • what vulnerabilities were detected
  • what data was accessed
  • how long the app allowed the intruders to be inside
  • what changes should be taken to enhance software security
  • what services are better to use to achieve desired results

Pentesters: who are they?

Penetration testing with Erbis



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store