If it's connected, we can break into it.   Downloads  |  About Us  |  Contact  |  Careers  |  News  | 

 Emergency  |  SanityCheck|  Penetration Test |  Risk Assessment | Product Testing | Security Solutions |
  Check your security NOW!
  Latest Security News 
"So in war, the way is to avoid what is strong and to strike what is weak."  - Sun Tzu, The Art of War

Product Testing
PREFIX : 1. Computer: cyberpunk. 2. Computer network: cyberspace.

Noun: Abbr. entom., entomol.
The scientific study of insects [bugs].
- The American Heritage Dictionary of the English Language

Cyber Entomology - The scientific study of computer/cyberspace flaws [bugs].
As a valuable service to our customers, Greyhat provides Cyber Entomology services to product manufacturers.  We firmly believe in finding bugs in software and in hardware and discreetly educating the manufacturer on corrective measures to mitigate the digital flaw.
Greyhat Product Testing provides manufacturers and software vendors a way to verify product security for coding defects. Greyhat cyber entomologists enjoy exploring the details of programmable systems and how to stretch their capabilities. We are experts who enjoy the intellectual challenge of creatively overcoming or circumventing limitations of products.
Client Deliverables
Greyhat will deliver a product-based Cyber Entomology report that contains an executive security overview, list of vulnerabilities, recommendations for risk mitigation, and a log of intrusion data obtained. The report will be delivered electronically in Adobe Acrobat format.
Don't let this be you...with Greyhat discreetly and internally uncover and rectify these defects.
* The following is provided only for educational purposes.  Greyhat assumes no liability and/or provides no warranty on the provided information.

http://www.cisco.com/warp/public/707/advisory.html >  
  Cisco IOS HTTP Server Vulnerability
  Published: May 15, 2000 - Updated: May 15, 2000
  Cisco IOS Software TELNET Option Handling Vulnerability 
  Published: Apr 19, 2000 - Updated: Apr 19, 2000
  Cisco Catalyst Enable Password Bypass Vulnerability 
  Published: Apr 19, 2000 - Updated: Apr 19, 2000
  Cisco Secure PIX Firewall FTP Vulnerabilities 
  Published: Mar 16, 2000 - Updated: Mar 20, 2000
Cobalt Networks
  Security Advisory - Frontpage 
  Published: May 25, 2000 - Updated: May 25, 2000
  Published: Mar 31, 2000 - Updated: Mar 31, 2000
  siteUserMod.cgi Update 
  Published: Jan 30, 2000 - Updated: Jan 30, 2000
  Majordomo Wrapper Update 
  Published: Jan 14, 2000 - Updated: Jan 14, 2000
Greyhat LLC   © 1998-2005  All Rights Reserved Worldwide   | Is Hacking legal? | WhatisGreyhat | Legal | Privacy |
Updated 03.27.05  dated