Infrastructure Penetration Test

As a base for secure applications, the system as well as the network infrastructure shouldn’t be neglected. We analyse both with the help of penetration tests (simulated hacker attacks) to find vulnerabilities. The exact form of the analysis has to be individually determined. Unlike actual attacks, the goal of the performed penetration test is not the exploitation of vulnerabilities, but the identification and verification of such. The result of the analysis is a report devoid of false-positives, that includes concrete instructions for administrators and additionally sums up the information about the risks for the responsible managers.

We assist you:

  • Information collection: Scan of the target object as well as identification of the services
  • List of all found services with the corresponding patch state
  • Check for known vulnerabilities and configuration flaws as well as validation and exclusion of false-positives
  • Brute force of login services in combination with password cracking (if needed) of potentially found password hashes using our graphics card cluster
  • Extensive results report with suggested measures in your desired format
  • Additional listing of findings and servers in tabular form for easy further processing
Dr.-Ing. Benjamin Kellermann

Your Contact:

Dr.-Ing. Benjamin Kellermann

Contact us via email.
Or call us or use our special contact form.

Wenn Sie auf der Seite weitersurfen, stimmen Sie der Cookie-Nutzung zu.
If you continue to visit the site, you agree to the use of cookies.
Privacy Policy / Cookie Policy

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close