Vulnerability Assessment service

We uses DarkRacer-Linux to carry out the vulnerability assessments. DarkRacer is a security distribution in linux developed and maintained by Oranz labz. DarkRacer is by far the most powerful distribution available in the world for performing penetration testing and vulnerability assessments.

Oranz vulnerability assessment is based on industry best practices we have developed and refined over engagements remotely and at client sites. The assessment includes tests for SQL injection, cookie manipulation, access control weaknesses, session state, and cross-site scripting. Upon completion of the assessment, our security engineers review the results with your organization and discuss potential remediation tactics. Full documentation of the assessment is provided in a series of customized reports designated by your company.

Our managed care solution provides substantial benefits over your company doing an assessment internally. Perhaps principal among these is that your organization requires full-time expert personnel, as they are required to reference and cross-reference against numerous types of reports being generated. The complexity of the process often allows important patches and updates to system files to fall through the cracks. Oranz’ proven expertise in vulnerability assessment and testing, as well as other related network security strategies, make us uniquely capable to provide you with unerring third-party validation of your security infrastructure and your in-place policies.

Frogwebber welcomes your inquiries about managed vulnerability assessment. Contact one of our representatives today to get more information or to arrange a meeting.

Key Features & Benefits

  • Scans by hostname, IP address or network range

  • Supplies login credentials for thorough detection

  • Scans all 65,535 TCP/UDP ports

  • Agent-less scanning technology, no client software to install

  • Network based vulnerability scanning

  • Credentialed based patch audits for Windows and most Unix platforms

  • Credentialed configuration auditing of most Windows and Unix platforms

  • Credentialed security testing of 3rd party applications

  • SQL database configuration auditing

  • Software enumeration on Unix and Windows

  • Executive and Detailed Vulnerability Reports

Feel free to contact us if you have any further queries. For complete details regarding our state of the art vulnerability assessment services, email us at This email address is being protected from spambots. You need JavaScript enabled to view it.