Provide knowledge
Our Wiki
This is our binsec wiki page.
On binsec.wiki you can find a structured checklist for evaluating source code security. Based on established standards such as the OWASP Top 10 and PCI DSS, it helps developers and security teams identify common vulnerabilities early. The checklist is used by binsec during code reviews and can also be applied to prepare for security assessments of web applications and APIs.
The "Hacking I: Scanning Networks" chapter of binsec.wiki's Pentest Training covers the critical first step in penetration testing: network reconnaissance. This phase involves mapping the attack surface by identifying active hosts, open ports, and the services running on those ports within a target network.
The "Hacking II: Password Attacks" chapter of binsec.wiki's Pentest Training delves into a critical aspect of penetration testing: exploiting weak or compromised passwords to gain unauthorized access. The chapter distinguishes between online and offline password attacks.
The Binsec Wiki’s "Hacking III: Web Application Attacks" explains that web apps with password-based roles expose a wide attack surface via forms, headers, and cookies. Client-side checks can be bypassed with tools like Burp Suite. Testing then focuses on common but critical flaws: SQL Injection (SQLi) and Cross-Site Scripting (XSS) - still among the most prevalent threats per OWASP.
Penetration Testing
Since 2013, we have been conducting professional penetration tests. All engagements are performed in accordance with international standards and backed by years of operational experience in penetration testing, red teaming, and offensive security. Originally rooted in the payment, finance, and banking sector, we bring extensive experience in highly regulated and security-critical environments.
As a specialized provider for professional penetration testing, we clearly distinguish between vulnerability scans and actual penetration testing. Tools are used selectively and interpreted within a clear methodology. However, decisive insights usually result from structured manual identification and analysis. We identify technical and business-critical weaknesses and subsequently assess them in a structured way based on their real-world risk. Looking for a professionally conducted penetration test with traceable results? Then binsec is your partner.
Contact us