Network Penetration Testing / Vulnerability Assessment
Network Penetration Testing is a security testing service that focuses on locating flaws in your networks, infrastructure and overall architecture (i.e. Server services, Operating Systems, Patch Levels and other Networking / Server components). In this service, vulnerabilities will be exploited in order to gain access to vulnerable systems. In a Network Vulnerability Assessment, which is a cost effective alternative to a Network Penetration Test, we only report on the flaws without actively exploiting them
Web App Penetration Testing / Vulnerability Assessment
More than 70% of all technical attacks aim at the Web Application layer. This service examines your web applications from a coding and implementation flaw perspective, but also looks at other issues like SQL injection, LFI, RFI and cross-site-scripting (XSS), involving active exploitation of vulnerabilities in order to gain access.In a Web Application Vulnerability Assessment, which is a cost effective alternative to a Web Application Penetration Test, we only report on the flaws without actively exploiting them.
Wireless Penetration Testing
Wifi Networks experience ever increasing popularity. Our Wireless Penetration Testing covers all threat vectors against Wireless Networks. Our audits contain attempts to crack Wireless Encryption and Authentication mechanisms, include the set up of rogue access points along with test phishing portals, a variety of man-in-the-middle (MITM) attacks, Denial of Service Testing and Bluetooth Security tests.
Mobile Application Penetration Testing
Mobile devices have surpassed desktops a while back. Mobile Application Penetration Testing covers all threat vectors concerning Mobile Apps such as iOS or Android Apps.We will try to bypass security in the same manner a malicious hacker would. The audits contain Application Runtime Analysis, Traffic & Encryption flaws, Insecure Storage, Code Signing, Memory Protections, Fuzzing and Exploitation.
Social Engineering
Often the latest technical perimeter defenses may be in place, yet corporate security is being breached. Why? Because an employee may plug a simple USB stick in, brought their own infected device into the corporate network, clicked on a malicious PDF or simple visited a malware website. Could your staff be tricked that way and put your security at risk? Our Social Engineering services will find out.
Cyber Intelligence Services
Have you heard about the dark web? This is where a lot of illegal hacking activities take place. Has your confidential data leaked out already? Are hackers planning to attack your business? Have you unintentionally shared too much information with Google? We provide you high-class reports around threats concerning your business. Reports can be delivered as a one time off or on a regular recurring basis.
Online Investigation Services
More and more criminal activity is taking place online. Our services are aimed at businesses and individuals alike who are in the need for information on the web. The service can consist of locating individuals, private detective open source investigations of any kind, background checks, Identity theft investigations, tracking assets and stolen goods and many more. We also can assist law enforcement agencies with cases.