Our consultants are practitioners of both CREST and Open Web Application Security Project (OWASP) to assess every aspect of the application's security from authentication mechanisms through to business logic and beyond. Often we find today that your applications may exist across different platforms; developed and maintained by different teams of developers, which can lead to a different number and different types of vulnerabilities, as such our team are versed in several different languages and protocols, to fully assess any security implications that may exist on your platform.
A small list of applications of some of the types of applications we are familiar with:
With over ten years penetration testing experience, our testers have worked in many different sectors and environments. Our testers are versed in multiple Operating Systems (OSs) and different types of network architecture, whether your organisation has a flat network, or a mature security focused network with multiple LANs. We can certain help you assess and mitigate any architectural weaknesses that may be present (or hidden) in your business network.
Our testers adhere to the CREST methodologies.
Some of the frequent network architectures encountered:
Our consultants are proficient with the following Operating Systems:
in addition to the following networking devices: