About Us

Vulnerability Testing

Are you 100% confident that your business isn't vulnerable to cyber attacks and ransomware?

Testing your fence line is the only way to truly know your risks. There are two primary categories of vulnerability testing: penetration testing and vulnerability scanning. Both help determine your organization's overall vulnerability posture but pentesting typically includes human-like techniques to bypass security measures while vulnerability scanning uses automated tools to analyze system and network settings. We can help with both pentesting and vulnerability scanning, either remotely or on site. Here are a few of our offerings:

Pentesting

  • Phishing
  • Spearphishing
  • Social engineering
  • Internal threat (stolen device or rogue employee)
  • External threats (via public internet connections)
  • Web app attacks
  • Wireless network attacks
  • Network exploitation
  • Hardware exploitation
  • Red Team / Purple Team

Vulnerability Assessments

  • Host Assessments (servers and desktops)
  • Network Assessments (all network devices)
  • Wireless Assessments (access points and bridges)
  • Database Assessments (locally or remotely hosted)
  • Application Scans

Please contact us to get started.

Copyright © 2021 Capitol Street Technologies, LLC.