How to Conduct a Safe PenTest
Introduction This article is intended to the PenTest Vendor as well as the PenTest receiver. The idea is to provide the reader with tips to follow in order to make sure that while you are conducting the pentest you do not harm the systems or their availability. These tips refer mostly to infrastructure or Web Application testing and not to protocol, application or other types of security tests....
read more