Active assistance hotline

Identify Internal Vulnerabilities

Is your printer also leased? Are you sure that maintenance on these devices includes security updates every time? In all our audits, printers are the first device through which we get onto the network without problems.
However we get onto your network, we see how quickly we can get administrator rights, and then start scanning the whole network.
In your company, how do people at the counter or reception react when someone wearing a fluorescent vest stands in front of them claiming to be working on ‘the internet’ in the street. What response is given when he wants to check with the modem that everything is OK with you?
So with auditing, we go much deeper than scanning. We effectively enter the internal network and think as a cybercriminal would, with even the possibility of physical access control
- Listing devices with missing patches, ...
- Attempt to crack passwords/logins Active directory
- How quickly full admin on devices/domain
- Internal DNS checks, checks used cerOficates
- Internal site checks, Cloud links
- Backup analysis if backups are found
- Documents scan for password & logins
- Man-in-the middle attack simulation
Of course, we prepare a comprehensive report with risk scales from which we can start defining an action plan.
Services & products

 

 

This website uses cookies The website of CyberContract bv uses functional cookies. In case of analysing our traffic or advertising, we also place cookies that share information about your use of our site with our analytics partners, our social media and advertising partners, who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services.
Show details Hide details
Allow selection Allow all cookies