External. The mission’ point of origin is positioned on the Internet

external
Auditor’ location

The auditor will be located on the external network and will be able to perform a set of scenarios to test the security of the perimeter held by the mission representative.

Targets :

This position primarily allows for the treatment of web servers or services meant for Internet users. This same approach allows for the analysis of all the technologies accessible to the external network.

This orientation also addresses the security of user stations to interact with data received from the Internet. An example of this would be computers using an e-mail client.

Scenarios :

It is possible to simulate the following penetration scenario :

  • A computer cracker, wishing to perform external fraud or proceed with an action to copy confidential data. In this scenario, depending on the mission representative’s choices, the attacker either has or doesn’t have an account to connect to the mission perimeter.