Services

Krash Consulting provides your organisation with an evidence based picture of relevant vulnerabilities and associated risks to your stakeholders within your web presence, business applications, Wi-fi and mobile infrastructure.
Red Team
Assessment

A Red Team Assessment is similar to a penetration test in many ways but is more targeted. The goal of the Red Team Assessment is NOT to find as many vulnerabilities as possible.

More Info
Vulnerability Assmt.
Penetration Testing

Vulnerability Assessment Penetration Testing (VAPT) gives an organization more detailed view of the threats facing its applications, enabling the business to better

More Info
Web Application
Penetration Testing

Application Security is built around the concept of ensuring that the code written for an application does what it was built to do, and keeps the contained data secure.

More Info
Mobile Application
Penetration Testing

Application Security is built around the concept of ensuring that the code written for an application does what it was built to do, and keeps the contained data secure

More Info

Wireless Application
Penetration Testing

Wireless network security audit is to analyse overall security of the customer’s wireless networks which includes warwalking, analysis and performing passive and

More Info
Cloud Application
Penetration Testing

Cloud is the preferred solution for data storage, infrastructure and services on demand today. Most enterprises migrate to the Cloud following different

More Info
Social Engineering
Assessment

Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. A socia

More Info
IoT Security
Assessment

Internet of Things (IoT) is fast becoming a reality and with it IoT security emerging as a critical area for development. With IOT upon us, automobiles, mobile phonesl

More Info

SCADA & ICS
Security Assessment

Industrial control system is a general term that encompasses several types of control systems and associated instrumentation used for industrial process

More Info
Thick Client
Penetration Testing

A thick client, also known as Fat Client is a client in client–server architecture or network and typically provides rich functionality, independent of the server.

More Info
DDoS
Simulation

Distributed Denial of Service or a DDoS is an attack that denies service for many hours which results in significant loss of revenue and reputation. Botnets are a kind

More Info
Infrastructure
Hardening

Server Hardening is the process of enhancing server security through a variety of means which results in a much more secure server operating environment.

More Info