Use penetration testing to identify security weaknesses and vulnerabilities in the assets of your business to increase your protection – from legal liability to reputational damage
Infrastructure Penetration Testing
Simulate an attacker against your internal or external systems with the goal to gained access to end-user systems, including escalating privileges, install custom malware or extracting critical data.
Web Application Penetration Testing
Comprehensively assess web or mobile applications for vulnerabilities that can lead to unauthorised access or data exposure.
Mobile Application Penetration Testing
Comprehensively assess the security of mobile devices and installed applications. Performing dynamic and static testing of the mobile applications and their end points.
Assess the security awareness and general security controls with respect to human manipulation, including email, phone, media drops and physical access
Industrial Control Systems
Combine pentesting and exploitation experience with ICS expert knowledge to prove the extent an attacker can access, exploit or otherwise interfere with critical ICS/SCADA systems.
Embedded / IoT Devices
Assess the security of your device(s) by attempting to exploit the embedded firmware, control the device by passing or injecting malicious commands or modify data sent from the device.
(c) Copyright 2009 – 2020 Hedgehog Security. All Rights Reserved. Hedgehog Security is a trading name of Hedgehog Security Ltd (No: 09866739) and a registered office at The Lab, Upper Tean, Stoke-on-Trent, Staffordshire, ST10 4ES.