Ethical Hacking

Ranging from thorough manual Pen Testing to Red Teaming

Hackers are creative and are often one step ahead of their victims. You can engage our ethical hackers to inspect and pentest your network infrastructure and systems. With their findings, they help to make your digital environment more secure.

Dedicated Hackertime

  • Intake call for time estimation
  • Your unique project for a fixed price

Documented Vulnerabilities

  • Overview of all found vulnerabilities
  • Classified according to criticality

Comprehensive Reporting

  • Full report including all details
  • With executive summary

Clear Recommendations

  • Solution-focused advice
  • Independent and not biased

Company Security Score

  • How you score against hackers
  • Based on criticality of errors

Personalized Debriefing

  • Explained in human language
  • We remain on standby after the test

What can you choose from?

BLACKBOX TEST

  • Pentester has no prior knowledge
  • Full test from outside

TIMEBOX TEST

  • Pentester based on time
  • We penetrate as far as possible

GREYBOX TEST

  • Pentester has partial information
  • Combining external and internal test

BUDGETBOX TEST

  • Pentester based on budget
  • We penetrate as far as possible

WHITEBOX TEST

  • Pentester has full prior knowledge
  • Full test from the inside

RED TEAMING TEST

  • All possible hacking and social engineering techniques
  • We work with predefined objectives

Possible Pentest Targets

Web Applications

Websites, e-shops, portals or CRM systems are a gateway from the Internet to sensitive data. We identify all vulnerabilities and advise on measures to be taken.

Mobile Applications

Mobile apps process sensitive data linked in various ways to other (web) services and systems. We test all possible links of iOS, Android, and Windows apps with or without the corresponding web application.

WiFi

Hackers can easily get in via WiFi. The signal is then picked up outside by criminals so that they can hack remotely and quietly without being noticed.

Software Defined Radio

More and more communication between our systems is wireless. Software Defined Radio (SDR) has increased the risks enormously. We map out everything (think of IoT devices).

ICS-SCADA

Industrial control systems and SCADA are connected to internet and corporate networks but do not have optimal security. We check this thoroughly. 

Compliance Audits

A pen test is often a mandatory part of an ISO 27001 or GDPR certification process. We thoroughly check whether you meet all the requirements.

Cloud Security

Your company works in the cloud. But are the links to your own environment safe? Maybe they create unforeseen security holes?

Company Network

We check whether hackers can penetrate your internal network and also whether malicious employees or visitors can misuse data from within.

Other Hacking Services

Red Teaming

We carry out realistic cyber-attacks, using the latest hacking techniques, to test your security. It is a complete cyber fire drill on the staff and the company network. So that you are prepared for a real attack.

Check-ups

Teleworking and migrations to the cloud allow staff to work flexibly from different locations. In the process, little consideration has been given to security risks. The check-ups detect all security leaks in your cloud environment.

Mystery Guest

How far does an unannounced visitor physically get into your company? We come on-site incognito, test it out and deliver a comprehensive report.

Forensic Research

If you are a victim of a cyber intrusion or ransomware, we track down the hacking path trying to find the malware so that you can restore the security of your network.

Hack-proof Tools

We have online backups, cyber insurance, the most efficient anti-ransomware scanner and a security score to check the digital footprint of your own company and your suppliers.

Cyber Threat Hunting

Through proactive and in-depth forensic analysis you can check if you have been hacked and if there are systems that leak information.

Criticality and Predefined Bugs

Low urgency (K4)

Criticality from 0 to

Medium urgency (K3)

Criticality from 25 to

High urgency (K2)

Criticality from 50 to

Very critical (K1)

Criticality from 75 to

All tests are performed in a very thorough and professional manner according to the CVSS standard.