Young hacker smiling

We hack your software

zero false positives

Expert intelligence + Specialized technology
DXST - SAST - IAST - SCA - DevSecOps
White Box - Gray Box - Black Box
Attacking Web Applications, APIs, Mobile Apps
Client-Server, Servers, Networks, IoT Devices
ICS: Industrial Control System

Comparative

Our Ethical Hacking and Pentesting services seek to find and report all the present security vulnerabilities in your application. It is important to distinguish between the different services we offer in order to select the service that fits your needs. To this end we present the following table:

Table 1. Comparison between Continuous and One Shot Hacking services.

Aspects

Continuous Hacking

One Shot Hacking

Attack Cycles

Multiple 1.

Only 1 1.

Remediation Support

yes Yes. 2

no No. 2

Average duration

12-36 months 3.

1-4 months 3.

Multiple hackers

yes A minimum of 5 hackers test your system.

info A minimum of 2 hackers test your system.

Face-to-face delivery

info Unlimited within the contract period. All information deliveries are made via Integrates 4.

yes Limited to two within the contract period:

  • 1 meeting via video-teleconferencing 4.

  • 1 final results summary meeting at your location 5.

Detection time

yes Early

  • Vulnerabilities are detected during development.

info Late

  • Vulnerabilities are detected when the system is close to production.

Alerting

yes Continuous alerting system via email to the project leaders about open vulnerabilities 5.

info No alerting system, only final reports.

View

yes Up-to-date information about your system’s security.

info Information about your system’s security at only one particular point in time.

Coverage

yes 100% when:

  • We start simultaneously with development.

  • We attack all versions of the existing code up to the subscription starting point to catch up, if necessary, with the development team.

  • Hacking does not stop during the development phase.

info Agreed upon by both the customer and Fluid Attacks before testing begins 6.

Windows

yes In the Continuous Hacking service environments:

  • Can constantly change.

  • Are not necessarily frozen.

  • Windows are not required for hacking.

info Frozen environments and test windows are required.

Infection

no Environments are not infected with cyberweapons.

yes Work stations and critical servers are infected with our custom cyberweapon Commands 7

Remediation percentage

yes Up to 100% of reported vulnerabilities can, potentially, be remediated.

yes Up to 80% of reported vulnerabilities can, potentially, be remediated.

Location

Always remote.

Remote or on premises.

Time to remediate

yes 2 - 3 weeks.

info 3 - 4 months.

Payment

Monthly payment.

1 or 2 payments.


Service status - Terms of Use