• Information Gathering: Data collection about the target network and its structure, identifying computers, their operating systems, and services that they run. Extracting all sorts of sensitive parts and listings from running directory services.
• Vulnerability Analysis: Quickly testing whether a local or remote system is affected by several known vulnerabilities or insecure configurations.
• Web Application Analysis: Identifying configurations and security weaknesses in web applications.
• Database Assessment: Test for attack ranging from SQL injection to attacking credentials, data extraction and analysis.
• Password Attacks: We have many useful tools from password attack to offline attacks against the encryption or hashing systems.
• Wireless Attack: We have abilities for attacks against multiple types of wireless networks.
• Reverse Engineering: In support of counteraction activities, it is one of the primary methods for vulnerability identification and exploit development. On the defensive side, it is used to analyse malware employed in targeted attacks. In this capacity, the goal is to identify the capabilities of a given piece of tradecraft.
• Exploitation Tools: We write our own exploits for research purposes to understand different attack vectors.
• Sniffing & Spoofing: We advice about preventing those who gain access to data as they travel across the network.
• Post Exploitation: This allows a maintained access to a system to control exploited systems.
• Digital Forensics: We perform forensics on networks, computers, and other devices.
• Reporting: To help collate the data collected from information-gathering tools, discover non-obvious relationships, and bring everything together in various reports. To produce state of cybersecurity reports.
• Social Engineering: Here we advise about exploitation of human behaviour as the weakest element in cybersecurity.