vulnerabilities

Vulnerability Assessment is a process in which the target network or application is thoroughly examined for presence of security loop holes, known as vulnerabilities. These vulnerabilities are the weaknesses in the target network or application that allows a malicious act to get in and cause damage.

These vulnerabilities can exist in multiple locations such as:

  • The Operating System
  • The applications running on an embedded device or a computer system
  • In application logic of a web/desktop application
  • The server where the application is hosted
  • Communication links or protocols

At SQAConsultant, we possess the expertise to examine all kinds of potential targets and attack vectors. We perform thorough vulnerability assessments of the targets by employing both manual and automated tool-based approaches. The combination of these techniques helps us to quickly identify the vulnerabilities in the underlying operating system, installed components, running applications, application misconfigurations, communication protocols and weak login credentials.