- Vulnerability assessment
- Network scanning and search for open ports/services/versions
- OSINT
- CVEs (Common Vulnerabilities & Exposures) and discovering the publicly available exploits
- SQL injection and XSS injection (Stored, Reflected, DOM based)
- OS command injection, LFI/RFI and session testing
- Authorization bypasses and CSRF attacks via source code review along with directory traversal access to different website folders
- We also conduct Remote Code Execution
- Tests while searching for credentials brute force attempts alongside URL parameters tests in order to detect any possible DDoS resistance failures