Software Developer
Mobile application penetration test (iOS, Android) and code review of an app for the banking sector
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Mobile application penetration test (iOS, Android) and code review of an app for the banking sector
Windows 10 client audit and security configuration review of the remote access
Web application penetration test of a banking protocol and security configuration review of a web application firewall
Assessing the security level by means of technical security audits from the internal and external perspective in the form of several security scans of internal networks and web application penetration tests of selected web applications
Web application penetration test of a newly implemented voucher functionality in an existing store environment
Application penetration test and code review of a Windows application for managing finances of companies
Technical and conceptual audit with internal security scan, Windows client audit as well as a process and design review
Red Teaming Assessment with OSINT collection, phishing emails, analysis of the internal attack surface and search for critical vulnerabilities as well as lateral movement in the internal network
Web application penetration test and code review of a web API for pairing clients and data transfer between clients
Training with quiz and demo to increase staff awareness of IT security
Security audit of the filter functions of a web proxy by means of technical tests and a review of the configuration as well as penetration tests of the interfaces from an internal and external perspective
Conducting a multi-stage audit with physical social engineering and a technical review of the Citrix platform using penetration tests with a focus on privilege escalation
Technical security audit with external security scan, web application penetration test, and test of the email infrastructure as well as a review of the firewall rules and conducting awareness training
Conducting a SOC study that identified and defined the operating model and services of a SOC, compared potential SOC service providers, and identified the financial resources required
Web application penetration test of a backoffice application for dealing with open payments and security configuration review of the relevant parts in the AWS Management Console
Configuration/Code Review and Penetration Test of an MQTT-based cloud backend for IoT devices
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: