is resolving...

01

The best way to stop attackers is to think and act like an attacker. Which is why, unlike many security firms, we don’t welcome recent grads or people with more experience in IT than security as penetration testers. Instead, we are and find good people who know about bad things.

step 1

Reconnaissance

The adversary is trying to gather information they can use to plan future operations.

step 2

Resource Development

The adversary is trying to establish resources they can use to support operations.

step 3

Initial Access

The adversary is trying to get into your network.

step 4

Execution

The adversary is trying to run malicious code.

step 5

Persistence

The adversary is trying to maintain their foothold.

step 6

Privilege Escalation

The adversary is trying to gain higher-level permissions.

step 7

Defense Evasion

The adversary is trying to avoid being detected.

step 8

Credential Access

The adversary is trying to steal account names and passwords.

step 9

Discovery

The adversary is trying to figure out your environment.

step 10

Lateral Movement

The adversary is trying to move through your environment.

step 11

Collection

The adversary is trying to gather data of interest to their goal.

step 12

Command and Control

The adversary is trying to communicate with compromised systems to control them.

step 13

Exfiltration

The adversary is trying to steal data.

step 14

Impact

The adversary is trying to manipulate, interrupt, or destroy your systems and data.

step 15

Reporting

Generating reports in multiple formats under recognised standards (including POPI).

WHY A PENETRATION TESTING?


MAIN GOALS:

LEARN MORE

Network Penetration Testing Services – External or Internal

We simulate real-world attacks to provide a point-in-time assessment of vulnerabilities and threats to your network infrastructure.

Web Application Penetration Testing Services

In addition to the Open Source Security Testing Methodology Manual (OSSTMM) and the Penetration Testing Execution Standard (PTES), ScaryByte's application penetration testing service leverages the Open Web Application Security Project (OWASP) - a comprehensive framework for assessing the security of web-based applications, as a foundation for our web application assessment methodology.

Mobile Application Penetration Testing Services

As the widespread use of mobile applications continues to grow, consumers and corporations find themselves facing new threats around privacy, insecure application integration, and device theft. We go beyond looking at API and web vulnerabilities to examine the risk of the application on a mobile platform. We leverage the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), and Penetration Testing Execution Standard (PTES) methodologies to thoroughly assess the security of mobile applications.

IoT and Internet-Aware Device Testing

Internet-aware devices span from ubiquitous, commercial Internet of Things (IoT) devices and systems to automotive, healthcare and mission critical Industrial Control Systems (ICS). Our testing goes beyond basic device testing to consider the entire ecosystem of the target, covering areas such as: communications channels and protocols, encryption and cryptography use, interfaces and APIs, firmware, hardware, and other critical areas. Our deep dive manual testing and analysis looks for both known and previously undiscovered vulnerabilities.

Social Engineering Penetration Testing Services

Malicious users are often more successful at breaching a network infrastructure through social engineering than through traditional network/application exploitation. To help you prepare for this type of strike, we use a combination of human and electronic methodologies to simulate attacks. Human-based attacks consist of impersonating a trusted individual in an attempt to gain information and/or access to information or the client infrastructure. Electronic-based attacks consists of using complex phishing attacks crafted with specific organisational goals and rigor in mind. ScaryByte will customise a methodology and attack plan for your organisation.

Wireless Network Penetration Testing Services

We leverage the Open Source Security Testing Methodology Manual (OSSTMM) and the Penetration Testing Execution Standard (PTES) as a foundation for our wireless assessment methodology, which simulates real-world attacks to provide a point-in-time assessment of vulnerabilities and threats to your wireless network infrastructure.

02

automated security audits

External Vulnerability Scanning

Our scanners are connected to trusted and popular (public and private) vulnerability databases and security communities. Our SPBA (Smart Proof-Based Analysis) algorithm automates multiple safe and read-only exploits to identify false positives so there is no chance of corrupting data or disrupting any targeted service.

Small Business

R4999.99

per month
  • 1x Web Application Scan
  • 1x Network Scan
  • 2x Detailed Reports
  • 12x Months SLA
  • -
  • -
Subscribe Now

Medium Business

R8999.99

per month
  • 2x Web Application Scans
  • 2x Network Scans
  • 4x Detailed Reports
  • Support
  • White Labeled
  • 12x Months SLA
Subscribe Now

Large Business

R----.--

per month
  • 3+ Web Application Scans
  • 3+ Network Scans
  • 6+ Detailed Reports
  • Support
  • White Labeled
  • 12x Months SLA
Sales Team