Vulnerabilities that could be exploited without credentials, such as port scanning, service probing, exploit research, and IDS/IPS system testing
Weaknesses that can be accessed from within your network security, such as system fingerprinting, firewall and access controls, admin privilege escalation, and configurations
Input validation attacks, cross-site scripting, SQL injections, cookie theft, database vulnerabilities, and other common online attack methods
Site survey and map of the wireless infrastructure. complete signal leakage testing, device discovery, physical device inspections, & other wireless-related protocol tests
KMicro Tech, Inc.
3525 Hyland Ave, Ste 265
Costa Mesa, CA 92626
Phone: (949) 284-7265