Rysc Corp. values client privacy and confidentiality, services are rendered with the utmost discretion. All assessments result in a report detailing the vulnerabilities identified along with recommendations, prioritization by risk, steps to reproduce the vulnerability, reference information and visual aids.
Leveraging manual and automated testing techniques, Senior consultants identify common vulnerabilities in your application / product including: buffer overflows, integer overflows, format string vulnerabilities, SQL injection, file inclusion, business logic flaws and more.
Each finding is documented in detail such that a developer can reproduce the condition with clear recommendations on how the problem can be fixed. We are also happy to integrate with existing QA reporting mechanisms such as issue tracking software.
Once your developers have corrected the issues identified, consultants re-test the application to ensure that their recommendations have been implemented correctly.