Enter your phrase and press "Enter" to search
FA
Ar
Content
News
Articles
Apacast
Newsletters
Educational video
APA Center of Semnan University
Introducing APA Center of Semnan University
Services of APA Specialized Center of Semnan University
Capabilities of APA Specialized Center of Semnan University
Cyber help
Social engineering
Security patch management application
Guide to working with the security patch management application
Children and the Internet Educational motion
Phishing detection plugin
Think first then click
Passive defense, stable Iran
Do you know what a hacker thinks
Training on installing the popular and practical plugin "Anti-Phishing Banking Portal"
Products
Bank portal anti-phishing plugin
ArezKave blocking plugin
Capital market security plugin
System management patch
Morchekhar system
Aquarium system
Barnamk Mobile
Education Courses
All courses
Workshops held at the conference "Stable Security, Stable Iran"
Summer courses 1401
User security workshop
Wireshark workshop from introduction to analysis
Network+
Wordpress
security+
Penetration test request
Website
Application
Network
Access Agreement
Launch certificate
Invited to cooperate
Contact us
Center maher services
Today : 2024/12/21
Home
Penetration test request
Access Agreement
Step 1
name of organization
website name
phone
email
Step 2
At what level should penetration testing be done?
Inside the organization with the presence of security equipment
Inside the organization without the presence of security equipment
Outside the organization without the presence of security equipment
Outside the organization with the presence of security equipment
At what level should penetration testing be done?
Does the employer provide face-to-face information to the executive?
Topology of the target network of core, distribution, access level
Hardware information (companies and operating system)
ISPs on the employer's side of the contract (ISPs on the side of the employer's contract)
Technology used in services and servers (Technology used in services and servers)
Technologies used on the website (Technologies used on the website)
Website username / password information (website username / password information
Does the employer provide face-to-face information to the executive?
How long does the collected information need to be kept/deleted by the administrator?
NO
Yes
Is social engineering/phishing allowed during testing?
NO
Yes
Is it possible to automatically scan all servers, equipment, ports and IP addresses? (exceptions must be specified)
How should the report be delivered to the employer? (Electronic/encrypted/printed in multiple copies) Does the employer have a special condition for how to store and deliver information?
NO
Yes
Can the employer change the configuration and specifications during penetration testing?
NO
Yes
Does the presenter have the right to exploit the network equipment or the website?
NO
Yes
Is it possible to use access control mechanisms (Trojan, keylogger, backdoor, virus, etc.)?
Security image