MemnonTech® is made up of ethical hackers ,
programmers and software architects from the USA,
Russia, China, Singapore, France, Italy, Israel, Japan
and the United Kingdom.
A number of our hackers and programmers, have
undertaken clandestine operations, but now focus
on using their skills to improve security for
organisations.
MemnonTech® uses the Hivemind™ method,
which is an extremely aggressive form of hacking,
designed to:
•Overwhelm targets, with a combination
of human, and cognitive computing
.•Counteract hostile hacking attempts
.•Detect and identify exact location of malicious
hackers. MemnonTech, utilises former officers
from:*National Security Agency,
*Defence Intelligence Agency, *CIA, and *Mossad.
We deliberately ensure, that we have the access to
work with former national security agents, in order
to provide even more stringent security for clients.
Additionally, we have developed a powerful hacking
algorithm, Cerberus100™ that works in conjunction
with our global network of human hackers to isolate
threats, as well as provide counter hacking attacks
on behalf of clients.
Penetration Testing & Vulnerability Assessment /
Analysis
•What is an Automated (Vulnerability) Scan?
An automated scan uses a vulnerability scanner
(such as Acunetix, Netsparker, Nessus or Qualys)
to identify common vulnerabilities in systems and
web applications, in addition to our own algotithim,
Cerberus100™.
Upon completion of each scan, a report is generated
automatically that details the issues identified
during the scan. This often includes a number of
false positives and potential vulnerabilities, since
the issues are not manually verified.
The reports include postulated risk ratings that do
not take into account the system design, the nature
of the application and business logic.
What is a Penetration Test?
A penetration test is a mainly manual process,
that involves multiple phases, designed to in short
overwhelm your security, and is carried out by
a security professional.
Although it may include the use of automated
software, especially in the preliminary phases of the
test, a penetration test cannot be entirely automated,
and at Memnon, we pride ourselves on the most
aggressive penetration testing procedures on the
market.
The process will be fully customised to meet client
requirements and to take account of the systems
under test. All identified vulnerabilities are verified
to remove false positives and are exploited to
demonstrate the real risks and impact of an attack.
The resulting report includes a management
summary, as well as detailed information on each
vulnerability, its risk rating, and mitigation advice.
Post-test discussions ensure the results and
recommendations are fully understood.
"Blind" versus "Apprized" Testing
Blind Testing: We attack your firewall as if we were
"malicious" hackers.
This means we have to perform a good deal of
under-cover work in approaching the hack, in the
same way a criminal would, using social engineering ,
and even more clandestine approaches.
Apprized Testing:
Non-disclosure agreements with your organisation
are signed, and you provide us details of your
firewall solution. We are then able to run a variety
of tests against your firewall defence, using exploits
appropriate to the devices and products actually
in use.
What Tools Do We Use?
Unless we are specifically instructed otherwise, we
use a combination of professional, commercial tools
and those clandestine methods, that are used by
the hacking community to conduct the tests.
This ensures that we expose significant
vulnerabilities swiftly, whilst also helping to identify
possible false positives - as well as false negatives.
©2022 Memnon Technologies. All Rights Reserved
Our Methods