Vulnerability Assessment
REVIEW OF SECURITY WEAKNESSES

Vulnerability Assessment, which typically includes vulnerability scanning, is intended to aid in the identification and classification of security threats. Vulnerability assessment services also give continuous assistance and guidance to help minimise any risks and threats that have been identified.

Network Vulnerability Assessment Methods :

Black Box : Scanning for vulnerabilities without any information on a target network. The external network perimeter is a starting point for scanning.
White Box : Assessing the network vulnerability ‘from the inside’ (having all the knowledge about the network).
Gray Box : Searching for vulnerabilities in the network, having some information about it (e.g., user login details), but without access to the entire network.

Give us a call or send us an e-mail to get cyber security support, or you can also contact us via WhatsApp to get quick incident response support.

  Drop An E-mail   Call / WhatsApp

Working Process

METHODOLOGY

Our Methodology is based on the following industry standards :

OWASP Testing Guide v4
NIST 800-115
The Pen Testing Execution Standard (PTES)
PCI Pen Testing Guidance

01
Planning

determining the scope, requirements, backups, restrictions and agreements.

02
Scanning

automated and manual scanning to identify vulnerabilities.

03
Analysis

analysis of the scan results and classifying vulnerabilities.

04
Reporting

scan outcome : reporting discovered vulnerabilities

How Secure is your Organisation?

Book A Free Security Assessment

we will analyse how secure your organisation/network is by discovering vulnerabilities.

Contact Us