Vulnerability Research
Vulnerability Research and Penetration Testing

One of the most effective ways to assess the
real security of an organization
Project results
1
List of configuration and architectural vulnerabilities
2
Threat model
3
Recommendations for improving security
Process
Defining an attacker model
Analysis
  • AWP users
  • Network equipment
  • Cellular networks
  • Wired network outside the controlled area
  • Wi-Fi networks (including at the field level) or Zigbee
  • Signal transmitted over the air
  • Access to the system via the Internet
Passive scanning of traffic to form an idea of the network map
Analysis of critical functions and consoles
Realized projects
Order a service