


We work in life-like conditions having strictly limited knowledge of your network and no information on the security policies, network structure, software and network protection used.
We examine your system having some information on your network, such as user login details, architecture diagrams or the network’s overview.
We identify potential points of weakness by using admin rights and access to server configuration files, database encryption principles, source code or architecture documentation.