Non-binding initial conversation
What should be tested? What are the technologies used?
Something that perhaps even generates revenue? Then your software should be secure.
But how can this be assessed?
The Black-Box Penetration Test can provide an external attacker's perspective on your software. However, security vulnerabilities can also be found via Code Review or White-Box Test, where the source code is examined directly.
I have been writing software for over 15 years. And β to be honest β I have occasionally built in security vulnerabilities. Not intentionally of course, but I know exactly how such vulnerabilities can arise. And how to find them.
I can also help your development team avoid repeating my mistakes.
What should be tested? What are the technologies used?
The source code is examined. I can verify findings on a test instance if desired.
and a debriefing of the results
"I know that there is a shortage of skilled workers, and we all have to work with what we have. Therefore, I will always act constructively and at eye level β no matter the result of the test."
Martin Haunschmid, CEO Adversary GmbH
SIGSEGV: Program failed
Program finished successfully.
In the initial consultation, you will get to know us and our philosophy, and we will briefly discuss how we can help you. So that you and your company:
Hacking
Incident?