Methodologies we use

  • OWASP top 10
  • COBIT ISACA Risk framework
  • Cybersecurity best practices
  • Information gathering
  • Reconnaissance
  • Attack vectors
  • Getting access
  • Privileges escalation
  • Full control
  • Risk management
  • Vulnerability scanning
  • Malware detection
  • Network scanning
  • Log review and analysis
Did you like the article?
Tell your friends about it