Pen-test. Vulnerability analysis
We provide services for the analysis and assessment of vulnerabilities of software and systems, namely, the search for potential vulnerabilities in publicly available sources, search for zero-day vulnerabilities, and pen-testing (penetration testing).
The main task is to detect and conduct exploitation of attack vectors on public resources of the company or critical information processed by the software solution to identify possible ways to compromise resources, gain access to sensitive data, disable resources or hinder their operation, etc.
The analysis is conducted from the perspective of a malicious intruder and can include both passive and active (potentially destructive) components.