+1 (614) 992-0424
HACKER ASTRA'S WORLD
Amateurs hack systems, professionals hack people.


BASICS of our services
a) Penetration testing; and
b) Vulnerability assessments.
The second (vulnerability assessment), is basically running a scan and providing them with a report. In some cases the vulnerabilities are only very briefly verified, but generally not exploited in depth. This is to eliminate false positives.
The first (penetration testing), builds on top of the vulnerability scanning, with the following simplified tasks:
Enumerate hosts
Identify vulnerabilities
Exploitation
Post exploitation
Pivot
Identify additional hosts (in scope) and then continue from number 1 with the new hosts.
Source code reviews
Social engineering
Physical penetration testing
Red teaming (This is a “combination” of several services.)
Sub-topics within this industry may include:
Archiecture reviews
Configuration reviews (Host Security Assessments)
PCI DSS penetration tests (These are like regular pentests but they must also adhere to all PCI DSS rules and raise all PCI DSS relevant requirement breaches.)
Training of employees (security awareness, maybe even coding)
GRC (Governance, Risk and Compliance. This is “checklist security” like ISO27001.) .

Opening Hours
MON-SUN 24