Our methods
Pentest
The penetration test is a simulated, realistic hacker attack. A considerably bigger part of the works is executed manually and we put ourselves in the role of a hacker. In this case our security-experts use the latest methods and tricks which are also applied by hackers and crackers.
Black-Box Analysis
The goal of a Black-Box Analysis is the examination of the security architectures and infrastructures from the internet, the detection of weak points basing on technical or organisational issues as well as the determination of measures for the elimination of weak points or rather the reduction of potentially harmful impacts on the internet.
Dumpster Diving
The Dumpster Diving is an additional method to obtain information of your company.
If someone gets access to discarded documents, memos, organisation plans, CDs, backups etc. he can easily reconstruct from these documents what role someone fulfills in the company.
Such an activity can already be a preparatory measure for an espionage or a hacker’s attack.
Social Engineering
Social Engineering is a highly efficient method to obtain company information without the use of technical tools.
The hacker uses a stepwise procedure. In telephone calls or via emails with different company employees he, in the first step, elicits information, especially relating to positions of responsibility, and information concerning organisational structure. In the second step to prepare his attack he uses this information as a means of confidence building.
Wireless Analysis
Wireless LANs offer a lot of practical advantages and help companies to save costs. At the same time wireless networks open a number of security gaps which make a company vulnerable to attacks coming from inside and outside.
White-Box Analysis
The goal of a White-Box Analysis is the examination of security architectures and infrastructures in the local area network, the detection of weak points basing on technical or organisational issues as well as the determination of measures for the elimination of weak points or rather the reduction of potentially harmful impacts in the local area network.