We look at your company from the attacker's perspective and give you an overview of the potential risks and attack possibilities against your company infrastructure within 24 hours.
** Only passive methods for research and no active attack methods are used (information gathering / perimeter analysis).