Penetration Testing
1) security check for code exploits. 2) conformal coat pierce test connection. 3) hardness indent.
See Also: Pen Testing, Pentest, Application Security Testing, Conformal Coating, Penetration Hardness, Network Security, Vulnerability, Indenters, Forensics
- Taylor Dynamometer, Inc.
product
Mobile Testing Center
MTC-1500
The Mobile Testing Center (MTC) is a preassembled, above ground, mobile, testing solution designed for outdoor testing applications. An affordable option to permanent Test Cells, the MTC is comprised of 2 ISO containers. Container 1 includes a Test Cell and heated and air-conditioned Control Room. Container 2 is optional and includes facility support equipment: Bulk Fuel Storage, Pneumatic System, Water Recirculation System (WRS), etc.
-
product
Penetration Testing Services
All web and mobile applications are vulnerable to attack. You are going to get hacked – it's not "if", it's "when." Before it happens, you want to make sure you have a mature security system in place. Our specialists in software security testing have a background in IT and software development, know different types of exploits, and have experience in performing thousands of pen tests. We get hired to hack into systems and determine weaknesses.
-
product
Open-source Penetration Testing Tool
SecSmash
Secsmash is a modular framework for leveraging credentials to enterprise security tools to own the enterprise. Instead of spinning up your own C2 on a pentest, leverage the C2 that organizations have already deployed. HTTP integrator takes inputs, and extractions to generate new inputs, to drive a chain of HTTP request to authenticate to the target system, enumerate connected hosts, and run commands.
-
product
RFID Fuzzing Tool
NFC Kill
The world's only RFID fuzzing tool. Securely disable RFID badges. Test and harden RFID hardware. Audit access control failure modes. Test and reduce the attack surface for pen-test customers. RFID Penetration testing.
-
product
Vulnerability Assessment And Penetration Testing
VA&PT
If new web applications are installed into your organization’s network, you have shifted your business physically to another network, or if your site requires IT governance and regulatory compliance, you should opt for Penetration Testing.
-
product
Network Security Testing
Network Security Testing helps to identify the vulnerabilities in the security system of a business and to guide with solutions to improve the security measures. The key objective of network security testing is to identify the security risks, level of possible threats and revenue impact. QA Mentor follows their proven 4-D model and use the derived security measures to secure the business system with help of iterative vulnerability assessment and network penetration testing.
-
product
Sand And Dust Test Chambers
Dongguan Amade Instruments Technology Co., Ltd
Sand and dust test chamber is also referred as dust-proof chamber, which is able to simulate the sand storm by putting the test piece in the chamber to judge the damage of sand-and-dust weather to products. Equipment is mainly applicable to determination of sealing performance of product shells based on the IPX5 and IPX6 degrees. Testing machine features a flow of air carrying dust in a vertical circulation, resulting in cycle use of sand during the test. Sand and dust testing has great significance to master the specimen’s performance to defend the penetration of dust particles, to withstand the abrasion of sands.
-
product
Security Testing Service
Web Application Penetration Testing. Mobile Application Penetration Testing. Security Code Review. Network Vulnerability Assessments.
-
product
Masks Particle Filtration Efficiency Tester
Sataton Instruments Technology CO., Ltd
Face masks particle filtration efficiency (BFE) tester is device to determine the particle filter penetration and filtration efficiency for respiratory protective devices and face masks. The tester with particle generator can provide sodium chloride particles and paraffin oil particles. It can measure the particle penetration, filtering efficiency and the breathing resistance delta P. It is widely used in quality control, research and development, certification, manufacturing or testing industry, etc.
-
product
Penetration Testing
Our penetration testing services reveal real vulnerabilities that matter to your environment. Ultimately LGMS will provide advisory and guidance to help your business to become more secure.
-
product
Microhardness Tester
MT91 Series
Newage Testing Instruments, Inc.
The Newage MT91 System is an automatic microhardness testing system that uses the Rockwell method for the hardness result. Hardness is measured based on the depth of penetration rather than using an optical system to determine hardness based on the impression diameter.
-
product
Cybersecurity Penetration Testing Assessments
Tripwire Professional Services
Organizations do all that they can to protect their critical cyber assets, but they don’t always systematically test their defenses. Penetration tests—otherwise known as pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems. Whether we are testing an application or network environment, Tripw...show more -
product
Network Penetration Testing
Metasploit
Network penetration testing (aka pen testing) and timely identification of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses.
-
product
High Strain Pile Driving Analyzer, Pile Testing Machine
SG-PDA
It is a state-of-the-art testing equipment to perform high strain pile bearing testing on piles.It will provide prediction on the pile bearing capacity, pile integrity, driving stresses and hammer performance for a given pile penetration. It is a relative low cost type of pile testing compared to static load test (MLT or CRP). The testing technique is quick and accurate.It can also be used to perform high strain pile bearing monitoring to evaluate pile driving information for pile bearing capaci...show more -
product
LEAK TESTER
Quickly and easily detect air and water leaks in building envelopes and rigid air barrier systems. Ideal for testing penetrations (fasteners, masonry ties, etc.) and continuity of joints and seams in rigid air barrier systems.
-
product
Intelligence – Led Penetration Testing
An Intelligence-Led Penetration Test (Intel-led Pentest) closely mimics the tactics and techniques of sophisticated and persistent cyber attackers with the intention of compromising an organization’s critical systems.
-
product
Penetration Testing
Reduce your risk of a breach by identifying and exploiting business-critical vulnerabilities with on-demand penetration testing expertise.
-
product
Probes For Non-Contact Ultrasonic Testing
SONOSCAN CFC / CF
Due to the strong damping properties of air, low frequencies in the kHz range are used in air-coupled ultrasonic testing. It is therefore all the more important that the ultrasonic transducers offer a particularly high sensitivity in order to ensure high penetration and improved resolution. We achieve this, among other things, by installing preamplifiers in the receiver probe as well as by using our own Piezocomposite Technology, which enables a flexible use of the matching materials in our CFC and CF probes.
-
product
IoT Devices Penetration Testing
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
product
Penetrometers
Penetrometers measure the firmness or hardness of fruit. Penetrometers are ideal for determining the best time to harvest fruit or to test its progress to maturity. The firmness of fruit is one of the most widely used parameters in testing its maturity, together with measuring the fruits sugar content using refractometers. Electronic penetrometers come with different diameter penetration points. This allows for fruit of different size and hardness to be tested. It is important that this first pa...show more -
product
Spirent SecurityLabs
The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization. Our dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis.
-
product
Electronic Safe & Arm Devices
Excelitas Technologies specializes in the design, manufacture, and testing of MIL-STD-1316 compliant Electronic Safe and Arm Devices (ESAD), Electronic Safe, Arm and Fire Devices (ESAF), and Firing Modules (FM) for safe fuzing requirements of both legacy and next-generation missiles and munitions. Our dedicated staff of research and design experts use the latest advances in technology to design smaller, lighter, and more cost effective ESAFs and FMs to meet evolving requirements of newer more sophisticated weapon systems. Capabilities include a line of components and subsystems that have been qualified for hard target penetration environments and next-generation smaller-class munitions.
-
product
Hardness Testers
Dalian Taijia Technology Co.,Ltd
Digital durometer for shore hardness testing pocket size model with integrated probe● Test scale: shore hardness● Standards: DIN53505, ASTMD2240, ISO7619, JISK7215● Parameters displayed: hardness result, average value, max. value● Measurement range:0-100HA(HD)(HC)● Measurement deviation:<1%H● Resolution: 0.1● Auto switch off● With RS232C interface● Operating conditions: 0℃ to 40℃● Power supply: 4x1.5V AAA (UM-4) battery● Battery indicator: low battery indicator● Dimensions: 162x65x38mm● Weight (...show more -
product
Application Penetration Testing:
Penetration testing (or pen testing) is a simulated security exercise in which ethical hackers attempts to exploit the vulnerabilities of an application system (web or mobile). The objective of this exercise is to identify any possible loopholes present in the system’s defence mechanism which the real hackers could take advantage of. QA Mentor practices the following stages while exercising this:
-
product
CREST Penetration Testing
CREST is a not for profit organization that serves the needs of a technical information security marketplace that requires the services of a regulated professional services industry.
-
product
Penetration Testing Services
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high pressure situations so we can and do advise on incident response- in real-time when needed.CHECK, CREST and Tiger accredited security testing.
-
product
Mobile App Penetration Testing
To verify the functionalities of your software, to check for the quality of your product, and to see that the applicationis working against business requirements, opt for Functional Testing.
-
product
Cyber Security Testing Services
Cyber security testing is often also referred to as pen testing or penetration testing. Such tests validate the cyber security defences of your applications, network infrastructure and even your team members. Our cyber security testers are highly trained and certified ethical hackers.
-
product
Veracode Platform
The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.
-
product
Penetration Testing Distrubution
BlackArch Linux
BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 1524 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. For more information, see the installation instructions.
-
product
SST Security Assessment
Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.