Penetration Tests

 

Within the framework of a pentest, we analyze your company's security thoroughly:

 

  • Is it possible to bypass the authentication mechanisms?

  • Are the appropriate cryptographic algorithms in use?

  • Are they hardened sufficiently?

  • Are sensitive data transmitted without encryption?

  • Which vulnerabilities exist within the application?

  • Is the underlying infrastructure hardened?

  • Which threat scenarios can be derived from these results?

 

Our pentest team holds these specific hard skills:

 

Operating Systems          

Linux, Unix, Microsoft Windows, Cisco IOS, BS 2000.

 

Cisco       

Switches, Firewalls, Routers.

 

Compiler Construction      

ANTLR v3, Domain-Specific Languages.

 

Databases   

Oracle, SQL Server, MySQL.

 

Database Languages

PL/SQL, T-SQL, SQL.

 

Debugging         

Immunity Debugger, OllyDbg, PyDbg, PyEmu, WinDbg.

 

Disassembling   

IDA Pro.

 

Fuzzing  

Peach Framework, Sulley.

 

Hacking  

Penetration tests, Reconnaissance, Scanning, Sniffing, Exploiting,

Anonymization, Kali Linux, Metasploit,  Social Engineering.

 

Honeypots          

Dionaea, Glastopf, Kippo.

 

Cryptography 

SSH, TLS, PGP, VPN, Authenticode, Code Signing.

 

Malware 

Reversing, Sandboxing, Packers, Signatures, Shellcodes (i386),

Deobfuscation, Rootkits, Code Injection, Code Extraction.

 

patterns & practices     

OWASP ESAPI, Open Security Architecture, CAB, SCSF, Enterprise Library.

 

Programming Languages

C#, Java, C/C++, Python, Perl, PHP, VB.NET, VB, VBA.

 

Protocols         

TCP/IP, TLS, Kerberos, LDAP, HTTP, SOAP, SMTP, POP3, IMAP.

 

Vulnerability Assessments     

QualysGuard, NeXpose, Nessus, IBM Security AppScan, OpenVAS.

 

Web-Development

ASP.NET, JSP, Servlets, CSS.

 

Web-Server       

Apache, Tomcat, Internet Information Server, JBOSS, TIBCO.

 

XML        

XML, XSLT, XPath, XML Schema, XSQL, SQLXML, WSDL.

ManufakturIT GmbH    |  +49 (0)2202 1882273   |  info@manufaktur-it.de