Security tests
Breaking into software products by exploiting common security vulnerabilities.
Security analysis
We analyze your software thoroughly and then advise on hardening the applications.
Security consulting
Risk analysis, application development, vulnerability assessment, consulting and training
LySec - Lycantec Security
Web & Software Security
Protection against cyber attacks with security analyses, preventive penetration tests, reverse engineering and consulting.
Our focus is on the analysis of software systems, including classic desktop products and websites. We strengthen the 3 protection goals of confidentiality, integrity and availability for you.
Not only do you meet regulatory requirements, you also avoid unnecessary costs due to production downtime, recovery and fines caused by successful access to your systems by unauthorized persons.
We will be happy to examine, analyze and advise you in order to develop suitable measures.
Why us?
Lysec - Lycantec Security
Through our 20 years of experience we know many architectures, many programming languages and many protocols, all this gives us the necessary knowledge and experience to reach the goal without common tools. Therefore we are able to dig a little deeper and to poach off the beaten track. Creativity is our strength besides our technical know how.
Daily vulnerability analysis
Developed protective measures
Security vulnerabilities found
Know-How
We know how IT works way down at the grassroots level.
Creativity
Only with luck does the crowbar lead straight to success. Anything beyond that requires creativity.
Tools
We don't use many well-known tools, but we know the few very well.
Equipment
We have our own test lab where we can simulate and analyze attacks.
Details
Security services in detail
Impressions
Insights of our work
Tools, technologies and methods
The Lycantec Technology Stack
We don't define ourselves by our tools but by what we accomplish with them. Ultimately, it's the result and the quality that count.
Procedure
Gateways to be checked
To plug holes, you first have to find and recognize them.
User Interface
Can data be tapped via the user interface?
Interfaces (APIs)
Vulnerabilities of data endpoints to external systems?
Permissions
Permissions sufficient and misconfigurations prevented?
Data transfer
Inbound and outbound data stream secure?
Data at rest
Suspicious information in permanent storage?
Program code
Can reverse engineering be used to derive data from the source code?