Testing systems before hackers.

Often referred to as "pen testing" or "ethical hacking," penetration testing is a systematic process of probing an organisation's computer systems, networks, and applications for vulnerabilities. Using the same techniques and tools that malicious hackers employ, ethical hackers—hired by the organisation—attempt to breach the system's defences, not to cause harm, but to identify and report potential weak points.

The goal of penetration testing is to uncover security flaws before they can be exploited by actual threats, ensuring that sensitive data remains protected and systems remain uncompromised. It's a proactive approach to cybersecurity, emphasising the importance of staying one step ahead of potential attackers.

Constantly under threat.

On average about 2 200 attacks happen a day. Hackers try their luck at any system they can get their hands on.

From Malware, to phishing, to DDOS, to DNS Tunnelling, the options are endless. In order to protect your data, you have to put your own systems to the test regularly, ensuring they are strong enough to withstand hackers. It is important not only to be one step ahead but many steps.

How Magix does it.

Depending on your use case is what type penetration test is used and to what degree your systems are tested. Penetration testing can be applied to: 

  • Web Applications
  • Mobile Applications
  • IT Infrastructure

Penetration testing comes in three primary types: 

  1. Black Box Testing: The ethical hacker has no prior knowledge of the target systems. They start their test with as much information as a real attacker would have, which is essentially none. This tests an organization's external defense and detection capabilities.
  2. White Box Testing: Also known as crystal box testing, the tester has full knowledge and access to the target systems, including the source code, architecture documents, and more. This provides a thorough examination of the system's vulnerabilities.
  3. Gray Box Testing: A hybrid of the two mentioned above. The ethical hacker has partial knowledge of the system. This approach attempts to simulate an attack by an insider or someone with partial knowledge, like an employee.

Clients Trust Magix for


Get a quote or speak to a specialist

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Contact Details

(+27) 11 258 4442
26 Saddle Drive
Woodmead Office Park
Van Reenen Avenue
South Africa