SERVICES

OUR

SERVICES

Scroll Down

We primarily offer services on the red team or "attack" side of cyber security, where we emulate the techniques attackers use to identify vulnerabilities in the targeted systems so that they can be addressed.

This includes, but is not limited to:

Internal network assessments
WiFi assessments
Web application assessments
Mobile application assessments on iOS and Android
Thick client assessments
Code reviews
Cybersecurity is in our DNA
External Boundary Reviews

Services

Our internal network assessment service helps identify vulnerabilities and weaknesses within your organisation's internal network, from the perspective of an attacker having gained access to a network point (physical or wireless) or command execution on an internal device.

Our Wi-Fi assessments evaluate the security posture of your wireless network, identifying potential vulnerabilities and threats to data transmission and access. We'll attempt to capture and intercept traffic, crack Wi-Fi passwords and review wireless encryption protocols to ensure that your network is secure and compliant with industry standards

Our web application assessment service evaluates the security of your organisation's web applications, including input validation, error handling, and authentication mechanisms. We will test for common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF) to ensure that your web applications are secure and compliant with industry best practices.

Our mobile application assessment service evaluates the security of your organization's iOS and Android mobile apps, including data storage, authentication, and network communication. We'll test for common vulnerabilities such as app permissions, encryption, and authentication mechanisms to ensure that your mobile apps are secure and compliant with industry best practices.

Our thick client assessment service evaluates the security of your organization's desktop applications and infrastructure, including endpoint security, data storage, and network communication. We'll test for common vulnerabilities such as malware, unauthorized access, escalation of privilege and data breaches to ensure that your desktop applications are secure and compliant with industry best practices.

Our code review service provides an expert evaluation of your organization's source code, identifying potential security vulnerabilities, weaknesses, and areas for improvement. We will review your codebase to ensure that it is secure, maintainable, and follows industry best practices.

Our external boundary review service evaluates the security posture of your organisation's external perimeter and Internet footprint from the perspective of an external attacker. We'll test for common vulnerabilities such as misconfigured firewall rules, open ports, and weak and default passwords to ensure that your external boundary is secure and compliant with industry best practices.