




The audit report presents an analysis of the results and determines the level of risk (scored out of 10) of each penetration vector, along with proposals to correct them.
Correct the flaws at your own pace and in your own way, and contact us for verification or if you need assistance.
The counter-audit report serves as proof that the GDPR computer security measures are properly implemented.
A “blackbox” audit scans your public zone with tools specialised in the languages and protocols of the services (HTTP, DNS, SSH, …) exposed on the public network (internet).
The aim of such an audit is to identify attack vectors through the public network and geographical zone (internet, public places) before a malicious hacker exploits them for criminal reasons, to the detriment of the company, within the framework of remote attacks and gadget infiltration operations.
A whitebox audit is typically conducted in a second phase, covering the analysis of source code and dependencies, and making it possible to guard against vulnerabilities that are more difficult but not impossible to see in a blackbox.
Recommendations for automating the detection of security vulnerabilities in Continuous Integration will also be proposed.
Nothing is absolutely secure from hacking: from password hacking to shell script injection tailored to a specific opportunity; to doors opened by social engineering adding the famous human factor. Cyber-defence is a subject that cannot be ignored by any company or service that deals with personal, confidential, health, or other data.
For a cyber-criminal, any means is useful to escalate from “privilege 0” to access to vital company resources. However, most attacks could have been easily prevented if only management had taken a regular look outside. That’s why YourLabs Business Service’s in-house Red Team offers you constant protection.
Let’s cultivate a security mindset in a friendly and playful atmosphere, in a “white hat” hacker aesthetic.