...
 
Commits (3)
......@@ -8,20 +8,18 @@ tags: ["devops"]
Our relentless DevOps offer personalized training and development for
streamline the deployment of the patches of his protégés, of a report optional
on-site management, and free to host a
[meetup] (https://www.meetup.com/Angouleme-Hack-Dev-Barcamp-1337/) internally
to convey the mindset of eXtreme Programing & Agile Manifesto
as part of
a friendly and fun atmosphere in a hacker aesthetic
local.
[meetup](https://www.meetup.com/Angouleme-Hack-Dev-Barcamp-1337/) internally to
convey the mindset of eXtreme Programing & Agile Manifesto as part of a
friendly and fun atmosphere in a hacker aesthetic local.
Practitioner of [engineering in constant
movement] (https://blog.yourlabs.org/posts/2020-02-08-bigsudo-extreme-devops-hacking-operations/),
we optimize local deployment time (development) until production (live),
via ephemeral branch deployments which streamline communication between your teams.
movement](https://blog.yourlabs.org/posts/2020-02-08-bigsudo-extreme-devops-hacking-operations/),
we optimize local deployment time (development) until production (live), via
ephemeral branch deployments which streamline communication between your teams.
We transform any deployment (and appreciating the challenges), into deployment
reproducible and automatic, persistent or ephemeral, for your own applications
reproducible and automatic, persistent or ephemeral, for your own applications
as for your monitoring tools, network, infrastructure ...
An answer in less than an hour evening & weekend included for any emergency
is offered with each service from € 4,250 per month.
is offered with each service from €4,250 per month.
......@@ -4,50 +4,51 @@ subtitle: Pentest over network
comments: false
---
Nothing is safe from hacking: from password hacking to shellcode injection written for a specific occasion,
social engineering adding the famous "Chair to keyboard interface" , all means are
good for escalating from privilege 0 to vital resources for
the company.
Cyber defense is an essential subject for all companies and services
Nothing is safe from hacking: from password hacking to shellcode injection
written for a specific occasion, social engineering adding the famous "Chair to
keyboard interface" , all means are good for escalating from privilege 0 to
vital resources for the company.
Cyber defense is an essential subject for all companies and services
that deal with private information.
## Punctual and continuous security audits
YourLabs Security Service offers a catalog of services in
constantly evolving
accessible in the form of specific missions for justify an obligation of means
against cyber criminals up to the continuous surveillance against other threats to your
business.
YourLabs Security Service offers a catalog of services in constantly evolving
accessible in the form of specific missions for justify an obligation of means
against cyber criminals up to the continuous surveillance against other threats
to your business.
## Services
**Personalized written report** certifying levels of risk from detected
vulnerabilities, with a strategic report for a half-day decision maker on
optional site.
** Personalized written report ** certifying levels of risk from
detected vulnerabilities,
with a strategic report for a half-day decision maker on optional site.
** In-house training ** to cultivate the security mindset in a
friendly setting and a fun atmosphere, in an [local hacker] (https://www.meetup.com/Angouleme-Hack-Dev-Barcamp-1337/) aestetic .
**In-house training** to cultivate the security mindset in a friendly setting
and a fun atmosphere, in an [local
hacker](https://www.meetup.com/Angouleme-Hack-Dev-Barcamp-1337/) aestetic.
## Audit and counter-audit report
The blackbox ** audit report ** analyzes the results and determines the level of
The blackbox **audit report** analyzes the results and determines the level of
risk (score out of 10) of each penetration vector.
A ** counter-audit report ** is offered for each service from
€ 4,250, it serves as proof certifying that the documented vulnerabilities in the
* audit report * are well corrected.
A **counter-audit report** is offered for each service from € 4,250, it serves
as proof certifying that the documented vulnerabilities in the
*audit report* are well corrected.
## Blackbox audit
** The "blackbox" audit ** scans your public area with specialized tools in networking and protocols (HTTP, DNS, SSH, ...)
exposed on the public network (internet).
The **"blackbox" audit** scans your public area with specialized tools in
networking and protocols (HTTP, DNS, SSH, ...) exposed on the public network
(internet).
** The goal ** of such an audit is to ** identify the attack vectors **
across the public network and geographic area (internet, public places)
before a malicious hacker exploits them in the context of ** remote attacks ** and [operations
gadget infiltration] (https://gitpitch.com/yourlabs/security).
**The goal** of such an audit is to **identify the attack vectors** across the
public network and geographic area (internet, public places) before a malicious
hacker exploits them in the context of ** remote attacks ** and [operations
gadget infiltration](https://gitpitch.com/yourlabs/security).
### Depth limitation warning
......@@ -55,29 +56,29 @@ The blackbox audit excludes further research from separate targets:
- static analysis of source code (whitebox)
- non-public thick client (mobile app, windows ...)
- maintenance infrastructures for third parties who do not have
given their prior written agreement in writing (customers, service providers,
public services ...)
- maintenance infrastructures for third parties who do not have given their
prior written agreement in writing (customers, service providers, public
services ...)
- Phisical intrusion (night and day time)
- phishing
- phishing
- ...
## Whitebox audit
The ** whitebox audit ** is typically carried out in the second phase, going through
The **whitebox audit** is typically carried out in the second phase, going through
static analysis of source code and dependencies, and helps to guard against
more difficult vulnerabilities but not impossible to see in blackbox.
## Full pentest audit
The ** full pentest audit ** applies the results of black and white boxe audit,
allowing the company to test in real situations the risks of infiltration,
data exfiltration, malware installations, cookies to intercept or even modify the network on the fly,
master certificates injection on fixed stations to betray protocols ciphers (https..),
through high-flying tactics without breaking and entering:
access badge hacking, lockpicking: doors, hard drive bay or
server rack, escalation, neutralization of alarms, cameras and all kind of detectors,
, identity or function theft ...
The ** full pentest audit ** is the best way for the company to see
and fixe the security loopholes discovered at all levels.
The **full pentest audit** applies the results of black and white boxe audit,
allowing the company to test in real situations the risks of infiltration, data
exfiltration, malware installations, cookies to intercept or even modify the
network on the fly, master certificates injection on fixed stations to betray
protocols ciphers (https..), through high-flying tactics without breaking and
entering: access badge hacking, lockpicking: doors, hard drive bay or server
rack, escalation, neutralization of alarms, cameras and all kind of detectors,
identity or function theft ...
The **full pentest audit** is the best way for the company to see and fixe the
security loopholes discovered at all levels.
......@@ -12,10 +12,15 @@ $color5: #81eafd
$color6: #ef64ee
$color7: #ef64ee
nav li
font-family: 'Press Start 2P'
header.main-header
position: fixed
top: 0
left: 1em
right: 0
background-color: white
main
margin-top: 8vh
max-width: 80em
margin: 0 1em
border-radius: 20px
......@@ -122,11 +127,12 @@ img
.main-nav
ul
margin: 1em 0 .5em
text-align: center
li
display: inline
font-family: 'Press Start 2P'
@include font-size(1rem)
a
display: inline-block
......@@ -176,9 +182,6 @@ footer
list-style-type: none
@media screen and (min-width: 1100px)
nav li
@include font-size(1.5rem)
main
margin: 3.5em auto
max-width: 1100px
......