Penetration and Vulnerability Testing
To start, there is no such thing as an un-breakable system, When we talk about system hardening, what that means is that your enviornment is as tough as
it can be with the clients that you have. In many cases, hardening is as simple as ensuring that nobody can access your systems from outside of your network.
From there the sky is the limit to go as far as you want, but what we recommend is to have us evaluate your business, software, access methods and policies and
come up with a plan that fits your business, future plans and work on a final solution that fits your budget. Below are a list of testing procedures and key items:
Blacklisting
Brute Force
Password Policy
SQL Injection
Application Vulnerability
User Validation
Code Injections
Buffer Vulnerability
Patch Vulnerability