Vulnerability scanning

We scan an app, a network or a website for vulnerabilities and security gaps. You benefit from a report without false positives.

DSecured uses various well-known and private software products to maximize the effectiveness of the vulnerability scan. Our experts manually review the results to avoid false positives and provide you with an accurate analysis.

Penetration testing

What makes DSecured's vulnerability scan so special?

We don't just use one software solution, scan once, check on the fly and basically give you a more or less automatically generated report. There is no perfect software solution - every tool has its advantages and disadvantages - you have to know them. Tool A can be very good in the case of web applications - but it is less suitable for general scans against internal or external networks. Tool B, on the other hand, can do this better, but generally does not cope well with authentication - so basically an app is not really scanned.

We therefore scan with various tools - ranging from well-known public and commercial solutions to our own developments that solve specific problems better. This means you can be sure that our vulnerability scans are as efficient as possible. Before the actual scan, an expert looks at the target manually in order to configure the tools optimally. The entire process is monitored by a human to ensure that everything is scanned.

The results are summarized, evaluated and checked for false positives. The result is a clean report with clear recommendations for action. The findings are sorted by criticality and provided with a risk assessment.

What is a vulnerability scan?

Generally speaking, a vulnerability scan is an automated check of digital systems such as IT networks, websites, SPAs or APIs for security vulnerabilities. The goal is to identify known vulnerabilities in the target.

How accurate is a vulnerability scan?

Modern vulnerability scanners are capable of detecting various security gaps, but they do so quite superficially. Automated methods often have problems understanding the target and so minor details can dramatically reduce the effectiveness of the scan. The latter is one reason why trained personnel should prepare and carry out the test. In general, a vulnerability scan is an important but very crude part of IT security strategies. A vulnerability scanner cannot replace a real attacker who is creative and familiarizes himself with the target.

Damian Strobel

"I consider vulnerability scans to be an absolute basic - definitely better than doing nothing."

Damian Strobel - Founder of DSecured

You can greatly improve your cyber security by having your systems scanned for vulnerabilities.

What does a vulnerability scan cost?

Small vulnerability scans can be carried out from 400 euros. The price depends on the size of the target. The larger and more complex the target, the higher the costs. A scan of a large internal and external network that hosts various services, applications and applications should not be underestimated in terms of cost. We will be happy to provide you with an individual offer.

How often should a vulnerability scan be repeated?

As with almost all IT security measures, the answer is: it depends. We recommend having it carried out at least once a year. In the case of critical systems or significant changes to the source code or the network structure, you may want to consider having the scan more frequently.

Vulnerability scanning

Software we use for vulnerability scans

In addition to OpenVAS and nmap (including various scripts), DSecured also uses our external attack surface management solution Argos to find unknown security vulnerabilities and problems. The latter provides deep insights into a company's perimeter.

We primarily use Burp Suite and Nessus as automated scanner solutions. These cover classic security vulnerabilities well. Burp Suite is also used to validate findings. We also run our own plugins within Burp.

DSecured is constantly developing special scanners with primarily Golang or Python - these are also used to get an even better picture of the situation. Examples include our tools for path traversals, SSRFs and XSS.

Are there differences between a vulnerability scan and a penetration test?

A very clear YES. A vulnerability scan is an automated process to find as many vulnerabilities as possible within a very short time - these are often trivial things. Examples include poor encryption, passwords that are too weak or default passwords, outdated systems and forgotten updates. Although vulnerability scans are an integral part of modern IT, those responsible should be aware of their limitations.

In a penetration test, there is a highly qualified ethical hacker who goes very deeply into the functioning of applications and networks, tries to understand them and grasps the interrelationships. This usually allows them to find significantly more security vulnerabilities than a scanner ever could. A penetration tester's behavior and results are much closer to those of a real attacker, which is why pentests are often carried out against particularly vulnerable systems.

How does a vulnerability scan work?

After a kick-off meeting with the customer, the goal is defined. In the best case scenario, you already know exactly what needs to be scanned. Important matters are discussed and it is clarified, for example, when the scans should run so as not to disrupt regular operations. Although our scans are generally configured in such a way that they should have no impact on operations, as we tend to scan rather slowly, something like this still needs to be discussed in advance. In the case of internal vulnerability scans, access may need to be clarified; the same applies to all applications in the external network. Contact persons and communication channels must be defined. This also includes contractual matters. Scanning is then carried out, which can take minutes, hours or even days. A report is drawn up, which is later handed over to the customer. A presentation can be made on request.

Some companies we have been able to help

Grab
PayPal
BMW
Goldman Sachs
Starbucks
ATT
TikTok
Hilton
Contact DSecured

Get a quote