Vulnerability &
Penetration testing

Network penetration testing — performing
security tests on a network system using
variety of methodologies and tools in
identifying potential vulnerabilities with testing
to ensure the vulnerabilities are real

Application penetration testing — revealing
the effectiveness of an application’s security
controls by highlighting risks posed by actual
exploitable vulnerabilities

Client-Site penetration testing — identifying specific
cyber attacks – Malware Infection, HTML Injection,
Open Redirection, Form Hijacking, Cors-Origin
Resource Sharing (CORS), Cross-Site Scripting Attacks,
Clickjacking Attacks

Mobile penetration testing — reverse engineering
mobile application (scanning architecture), analysing
protection of sensitive data at rest and in transit,
verifying implemented cryptographic algorithms,
authentication methods and controls. Penetration tests
are aligned with industry standards. (OWASP Mobile Security Project)

Source code review — Security Code Review – based on Static Application Security Testing (SAST)
Tools and IDE – analyzing source code and/or
compiled versions of code to help find security flaws
Java, C#, C++, ASP, .NET, PHP, Ruby, HTML5, Swift etc.



download here
our services portfolio

Information Security & Compliance company