We should have as much information as you can provide. Any additional information, photo, email, old address, names, colleagues, friends, workplaces. Anything can turn out to be a great source of information.
The service fee consists of two elements - a fixed fee - which is €100 (the initial fee is fixed, regardless of the amount of information found. including fees for commercial databases, tools, license, etc.). The Final Amount depends only on the amount of information found, time devoted to the order, and the complexity of the order. However, always before starting work, we inform the client about the final amount to be paid.
Yes - initial fee - which is €100 (the initial fee is fixed, regardless of the amount of information found. Including fees for commercial databases, tools, license, etc.)
If no information is found in a given case, then the customer will not be charged (only initial payment - €100). The fee is charged only when at least one piece of information is found and then it is the sum of the initial fee and the appropriate amount determined before the start of the order.
Addresses of residence, business, telephone numbers and communication identifiers, close friends, contractors, relationships with other persons or entities, accounts on social networks, e-mail addresses, technical data of the systems used, geo-location determination, analysis of the technical infrastructure used, metadata files, e.g. when the photo was taken, where they were taken, etc.
We are able to provide a vulnerability assessment of web applications, internet-connected servers, and internet-connected networks. Multiple targets can be included in one assessment, however, as the range of targets expands, the level of detail will be reduced in a fixed-price offering. If you need a large number of assessed endpoints online, custom options are available. In addition, we conducted a targeted WordPress security assessment and attack surface assessment using open source intelligence that can be performed without impacting the target network/systems.
Our professional assessment services are popular with anyone wanting to have an independent external assessment of their security status. Customers are located all over the world and range from small businesses to large enterprises.
By using a combination of manual security tests and automated testing tools, the site, network, and/or system will be checked for security vulnerabilities. The results of the automated tools are assessed and verified using manual testing methods and other tools. An easy-to-follow safety report is then created that provides an overview of the findings in an understandable format.
Vulnerability Testing is an automated process, pre-programmed to find weaknesses and vulnerabilities. Penetration testing covers a much wider area and relies on the combination of automation techniques and specialist knowledge to recreate the methods used by hackers during an attack.
Costs depend on many components, such as the size of the network, which defines the length of the tests. Each project is individually priced.