Below you can find some selected examples of our project references. Some technical security details may have been altered to protect confidentiality and to adhere NDAs.

01 Penetration Testing

Pentesting of DICOM software

  • Penetration Testing
  • DICOM
  • Medical Device
As an international standard for medical imaging, DICOM defines the formats for medical images and ensures that they can be exchanged with the required data and in the required quality for clinical use. Details

Security Analysis for an international Travel Booking Portal

  • Penetration Testing
  • Travel
  • Booking
During the pentest of a booking portal for an international travel agency, we had to pay particular attention to the relevant limitations during the test. Details

Penetration Test for Online Sports Betting Provider

  • Penetration Testing
  • Sports Betting
Licensed online sports betting providers are subject to special regulatory requirements that may also affect a penetration test. Details

Penetration Testing Payment APIs

  • Penetration Testing
  • Payment API
Pentesting payment APIs is a typically assignment, we did countless times. Even if the basis is checking against OWASP Top 10, we still take a look on more logical security topics, too. Details
02 Penetration Testing

Testing of external IT infrastructures with large IP networks

  • Penetration Testing
  • external IT infrastructures
We regularly receive customer inquiries who would like to have their publicly accessible IT checked for vulnerabilities. In the case of very large IP networks, this can get difficult in terms of time. Details
03 Forensic & Incident Response

Forensic Analyses of a Creditcard Data Theft

  • Digital Forensics
  • PCI DSS
  • CreditCard Data
Performing forensic analyses require a deep technical understanding and experience. A good example of that is a forensic analysis we performed regarding a potential credit card data theft. Details

Incident Response DDoS-Angriff

  • Incident Response
  • DDoS
  • Mitigation
Having the experience in designing and setting up high available and secure infrastructure networks, we came across multiple DDoS issues we successfully resolved. Details