We examine your company from an attacker's perspective and provide you with an evaluation of the potential risks and attack vectors of your infrastructure within 24 hours.
** Only passive methods are used for this purpose rather than active modes of attack (Information Gathering / Perimeter Analysis).
The results of this will be comprised of publicly available information about your company. In some cases this can be very outdated information, such as already invalid e-mail addresses or passwords that have not been used for a long time. For potential attackers, however, such information is of immense importance.