• Vulnerability Scanning: Using automated tools to identify and report on potential security weaknesses in your network and systems.
• Social Engineering: Manipulating people into giving up confidential information or performing unauthorized actions.
• Network Mapping: Utilizing tools to map out a network’s topology and identify potential entry points.
• Penetration Testing: Using automated tools and manual methods to identify and exploit weaknesses in your networks and systems.
• Physical Security Testing: Utilizing physical reconnaissance and covert methods to assess the physical security of your organization.
• Malware Analysis: Examining malicious code to better understand the nature and purpose of the attack.
• Database Enumeration: Utilizing tools to identify and retrieve information from databases.
• Application Security Testing: Utilizing tools to evaluate the security of web and mobile applications.
• Wireless Network Testing: Utilizing tools to assess the security of wireless networks.
• Phishing Campaigns: Utilize emails to employees or partners to gain initial access or information about systems including credentials.