Hurricane Labs differs from most companies in that we test from the perspective of potential attackers. We do not rely on the typical scanning tools or generate automated reports. We use the same open tools and manual approaches you would expect from a skilled attacker. The difference is we are experts at helping you remediate potential vulnerabilities and exploits.
Our ability to customize tools for your business and our security expertise give us the edge to create reports that provide concise data, realistic examples on how to reproduce the problems, and most importantly, the information on how to correct the issues we’ve discovered. On top of all that, any scan data that is produced is still included in the rear-section report. We provide penetration testing AND analysis.
The penetration testing process will proceed upon your request. We will start when you give the okay, and we will cease when you need us to. The steps of a standard penetration test are as follows: discovery, scanning, attack, report, remediation, and retest.
Throughout all of these steps, you are updated with our progress. If at any point you have an issue, we are available 24/7, so you can give us a call and get answers. When the test is concluded, you are given the penetration report in a timely fashion, usually governed by the number of targets and amount of data found.
Hurricane Labs will also perform a security assessment on mobile applications. This test will assess vulnerabilities within the application, as well as the methods of communication. A complete forensic analysis will be performed to identify sensitive data stored on the device which may be accessible to third-party applications or outside users.