We connect our client’s security presence to proven methodologies to remediate vulnerabilities in Web Applications and Infrastructure. We improve our client’s security posture, improve audits, and teach cyber security.
Capitol Consulting begins all penetration tests with a combination of Social and Technical reconnaissance. Social reconnaissance identifies information that would compromise the target, such as information on company websites. We include source code analysis to establish an Internet security profile. Technical reconnaissance focuses on the discovery of hosts, service fingerprinting, configuration analysis, web server directory enumeration, etc. Depending on the threat and intensity levels, we use port scanners, web application scanners, vulnerability scanners, etc.
With senior management, Capitol Consulting determines the threat level to the asset and organization to create a plan of action that is implemented to white hat standards: the threats that are rated on a scale from one to ten.
Subscribe to our newsletter
Get our latest news and updated in your inbox!

