Scope of the pentest
During this assessment, our ethical hackers evaluate public resources regarding sensitive information about your company.
The assessment is typically conducted remotely.
Exemplary test objects:
Password Leaks
We query public password databases for entries associated with your employees.
Search engines
We use queries with advanced syntactic filtering to identify information about you.
Shodan.io
Shodan analyses and scans the entire Internet periodically. Here we try to look up information about your external IT assets.
Web Caches
"The Internet never forgets" - We query cache databases to obtain information from archived versions of your webpages.
In 2020 more than 3900 data leaks were disclosed. ¹
93% of all employees share excessive details in social networks. This also leads to security risks for companies. ²
Cyber Security Check
Our approach
This scenario-based assessment includes a passive reconnaissance check of your organization from the perspective of an external attacker. We simulate an adversary with access to openly available sources on the Internet. As much information as possible is gathered about your organization.
For our test only publicly available ressources and passive data aquisition is used. Your IT infrastructure and company data will not be enumerated actively (no port scans, social engineering or similar methods).
This simulation gives you an overview about openly accessible information regarding your organization, which might be used as a platform for actual attacks.
After our assessment you will receive an Excel report with all identified information, as well as a presentation from our team.