Cookie Consent by Free Privacy Policy Generator website
01
Security tests

Breaking into software products by exploiting common security vulnerabilities.

02
Security analysis

We analyze your software thoroughly and then advise on hardening the applications.

03
Security consulting

Risk analysis, application development, vulnerability assessment, consulting and training

Data Security Concept 2022 02 07 09 16 48 Utc
LySec - Lycantec Security

Web & Software Security

Protection against cyber attacks with security analyses, preventive penetration tests, reverse engineering and consulting.

Our focus is on the analysis of software systems, including classic desktop products and websites. We strengthen the 3 protection goals of confidentiality, integrity and availability for you. 

Not only do you meet regulatory requirements, you also avoid unnecessary costs due to production downtime, recovery and fines caused by successful access to your systems by unauthorized persons. 

We will be happy to examine, analyze and advise you in order to develop suitable measures.

Why us?

Lysec - Lycantec Security

Through our 20 years of experience we know many architectures, many programming languages and many protocols, all this gives us the necessary knowledge and experience to reach the goal without common tools. Therefore we are able to dig a little deeper and to poach off the beaten track. Creativity is our strength besides our technical know how.

0 +
Daily vulnerability analysis
0 +
Developed protective measures
0 +
Security vulnerabilities found
Know-How

We know how IT works way down at the grassroots level.

Creativity

Only with luck does the crowbar lead straight to success. Anything beyond that requires creativity.

Tools

We don't use many well-known tools, but we know the few very well.

Equipment

We have our own test lab where we can simulate and analyze attacks.

Details

Security services in detail

Video

What we testing

Your assets

We specialize in the audit and analysis of the following assets

Homepage Of Educational Website On Laptop Display 2021 09 24 03 10 30 Utc

Websites

Review, analyze and monitor online presences
Businessman Using Laptop PV9C76B

Desktop applications

Server and client programs and scripts.
Smarthome Security App 2021 08 29 16 50 24 Utc

Mobile Apps

Analysis of communication channels and forensics Analysis of communication channels and forensics
Colorful Telecommunication Colorful Ethernet Cable 2021 08 30 19 01 17 Utc

Cloud environments

Interface analysis and penetration testing.
Business Meeting P2R3CQ9

Intranet portals

Vulnerability analysis and vulnerability scanning
Code On Computer Screen Programming Software 2021 08 27 09 30 57 Utc

Source code

Either by reverse engineering or within the scope of a code review
Tools, technologies and methods

The Lycantec Technology Stack

We don't define ourselves by our tools but by what we accomplish with them. Ultimately, it's the result and the quality that count.

Procedure

Gateways to be checked

To plug holes, you first have to find and recognize them.

01
User Interface

Can data be tapped via the user interface?

02
Interfaces (APIs)

Vulnerabilities of data endpoints to external systems?

03
Permissions

Permissions sufficient and misconfigurations prevented?

Cpu Vulnerability 3D Render Hacked Processor Conce 8WUSGAS
04
Data transfer

Inbound and outbound data stream secure?

05
Data at rest

Suspicious information in permanent storage?

06
Program code

Can reverse engineering be used to derive data from the source code?

Convinced?

Any questions?

Write to us, subscribe to our newsletter or subscribe to us on social media.