A1B2 Security

Certified Information Security Technical Experts

Analyse the perimeter

Get a view of your internet facing assets from an attacker's perspective

Is my website secure ?

Find your bugs before they find you

Protect my application data

Can my clients' or users' privacy be compromized ? Analyze your application in depth

Prevent a disaster

What would be the impact of an attacker foothold ? Am I vulnerable to an insider threat ?

About Us

Ethical hackers finding vulnerabilities to help protect you and your clients.

We provide information security consulting services, mostly through the execution of web and network pentests. Every test includes a report listing the vulnerabilities found in details as well as potential solutions or mitigations.

  • Certified experts
  • Years of experience in finding vulnerabilities
  • Respecting industry best practices and standards
  • Continuous training to stay on top

Much more than just a scan!

A proper pentest, on any target, always includes a lot of manual testing. Even though pentesters have automated tools in their arsenal, they also do a lot of things manually to ensure that the context is considered and respected. It yields much more accurate and numerous results than an automated scan alone, with a rate of false positive close to zero!

Learn More

Services

These different services are all designed to help you improve the security posture of your organization by identifying and correcting vulnerabilities.

Find out what hackers could find before they do.

Black box web application pentest

Find web vulnerabilities on your web application to improve its security posture. In the black box version of the tests, no accounts are provided and the application is tested as if attacked by an outsider. This is the quickest version of the web pentests.

Gray box web application pentest

Find web vulnerabilities on your web application to improve its security posture. In the gray box version of the tests, some accounts are provided and the application is tested as if user accounts were compromised, or as if a user was malicious. This gives the best results without sharing private source code with the tester.

White box web application pentest

Find web vulnerabilities on your web application to improve its security posture. In the white box version of the tests, accounts are provided as well as the application source code, and the application is tested as if user accounts were compromised, or as if a user was malicious. This is the most thourough and reliable version of the tests, as it includes a partial code review to yield better results.

Network perimeter pentest

Find out what an attacker can see of your organization on the Internet as our experts try to breach your network perimeter.

Internal network pentest

Assume the breach of your network perimeter in this internal version of a network pentest. Find out what could be the impacts of a compromised user workstation in your network. The goal is a protection in layers.

Generic consulting services

Let us know what are your needs and we may just be able to help you!

Don't Wait Until It's Too Late

You cannot do a proper risk assessment of your organization or products without knowing what the dangers are. Find out the weak points and work on them to lower your risks.

Start To Improve Now

Contact

We are a Montreal based business. Do not hesitate to contact us via email or through the following form for more information on our services! We will get back to you as soon as possible. Services are offered in English as well as in French.

Location:

Montreal

Loading
Error while sending the email. Please retry later!
Your message has been sent. Thank you!