Technical audit

Pentest, configuration, partitioning, network, application, secret detection

We assess your technical surface from end to end. Each part of the audit produces evidence, qualifies risks and leads to a prioritized, short-to-execute and measurable action plan.

Pentest

Phishia's pentest offer gives you a clear view of your security flaws. We test your applications and APIs against known faults from Top 10 OWASP authentication and access control, injections (SQL/NoSQL), XSS, SSRF... Then we offer you concrete corrective measures to reduce the risk of incidents. As a result, you gain credibility with your customers and partners.

Configuration

We check the configuration of your equipment: access control rules and permissions, the authorizationsthe kernel/versions, network configuration. We provide clear hardening recommendations to improve the resilience of your systems.

Partitioning

We make sure partitioning your environments production / pre-production / administration / office automation, internal / external access, service providers, etc. The aim is to detect gateways and clean up FireWall rules. You'll leave with an easy-to-read map of zones and flows, priority filtering points and simple rules to reduce lateral movement.

Secret detection

We are looking for keys, tokens and password who are in clear text in scripts, repo, images or logs. Each discovery is qualified and followed by a remediation plan that replaces exposed secrets with secure credentials via the trunk (vault), eliminating any presence of unencrypted passwords. . We then propose light automatic controls to prevent these secrets from reappearing, with a clear follow-up table.

Our blog

Discover the latest news and trends in technical and organizational auditing.

en_US