Atlanta, GA,USA
(678)-621-8487
info@schwifty.com

Vulnerability Assessments

Identification of potential vulnerabilities in your network and applications.

Internal Vulnerability Assessments

  • Scan Card Data Environment for potential known vulnerabilities and misconfigurations.
External Vulnerability Assessments
  • Perform a scan of one or more public Internet facing IP addresses.

 

 

 

Internal Vulnerability Assessments

  • Evaluate one or more internal network devices for potential known vulnerabilities and misconfigurations. 

External Vulnerability Assessments

  • Evaluate one or more public facing IP addresses for potential known vulnerabilities and misconfigurations.

 

 

Internal Vulnerability Assessments

  • Perform discovery of internal network devices for potential known vulnerabilities and misconfigurations. 

External Vulnerability Assessments

  • Perform OSINT (Open Source Intelligence) of client and their public Internet facing assets. Scan public facing IP addresses for potential known vulnerabilities and misconfigurations.

 

Penetration/Perimeter Testing

Real world security tests to identify your weaknesses.

Internal Penetration/Perimeter Testing

  • Circumvent access control systems.
  • Perform internal vulnerability assessment.
  • Perform penetration test on any vulnerable systems or gain administrative privileges. 

External Penetration/Perimeter Testing

  • Obtain as much Personally Identifiable Information (PII) on target as possible.
  • Perform user account enumeration.
  • Perform manual and automated vulnerability assessment.
  • Perform penetration test on any vulnerable systems or gain administrative privileges.

 

 

Internal Penetration/Perimeter Testing

  • Circumvent access control systems.
  • Perform internal network discovery.
  • Perform manual and automated vulnerability assessment.
  • Perform penetration test on any vulnerable systems or gain administrative privileges.

External Penetration/Perimeter Testing

  • Perform public facing Internet discovery.
  • Obtain as much Personally Identifiable Information (PII) on target as possible.
  • Perform user account enumeration.
  • Perform manual and automated vulnerability assessment.
  • Perform penetration test on any vulnerable systems or gain administrative privileges.