Penetrační testy

Penetration tests

Penetration tests represent a simulation of an attacker attacking the tested systems, applications and websites. Their main goal is to determine how easily identifiable a target these systems are, what information can be obtained about externally accessible systems, how vulnerabilities that can be exploited to gain unauthorized access to sensitive resources can be detected, and to propose appropriate recommendations for remediation.

During penetration tests, procedures, techniques and tools available on the Internet are used to simulate as closely as possible the likely course of action of an attacker. Cyber Hazard’s testing methodology is based primarily on the OWASP Testing Guide v.4.2, currently the most recognized methodology for web security. This procedure provides a comprehensive approach to examining all areas of web security of current technological capabilities.


Vulnerability scanning

Vulnerability Scanner is an automated tool that assesses potential security vulnerabilities in computers, internal and external networks, communication devices, scans web applications and looks for security vulnerabilities such as Cross-site scripting, SQL Injection, Command Injection, Path Traversal and insecure server configurations that can be exploited by cyber criminals. The resulting vulnerability assessment report will help you quickly identify security weaknesses that need to be addressed.

Skenování zranitelností​
Sociální inženýrství​

Social Engineering

Social engineering scams are built on how people think and act. Social engineering attacks are therefore particularly useful for manipulating user behaviour. Once the attacker understands what motivates the user’s actions, he can effectively trick and manipulate the user.


Education is important for us

Cyber Hazard

Sledujte nás na sociálních sítích!