This page looks best with JavaScript enabled

Starting a Pentesting Assessment for

 ·  ☕ 1 min read  ·  👨‍💻 Ibrahim Durmus


Executive Summary

Together with 2 other students we contacted to conduct a penetration test to determine their exposure to a targeted attack. All activities were conducted in a manner that simulated a malicious actor engaged in a targeted attack against with the goals of:

  • Identifying if a remote attacker could penetrate’s defenses.
  • Determine the impact of a security breach on:
    • Confidentiality of the company’s private data.
    • Internal infrastructure and availability of’s information systems.

Efforts were placed on the identification and exploitation of security weaknesses that could allow a remote attacker to gain unauthorized access to organizational data. The attacks were conducted with the level of access that a standard customer would have.

Kill Chain

During the pen test, we used the cyber killcain. We followed and documented every step of the killcain.

Kill Chain


The company is still working through the points in the report.The document is only available for teachers at the moment.

Download the penetration test report

Share on

Ibrahim Durmus
Ibrahim Durmus
Cyber Security Student