Vulnerability assessments and Penetration Testing

There are typically two main methods for examining potential weaknesses in a company's cyber defences. One is known as penetration testing, the scenario where a website and / or a network is examined to find vulnerabilities to SQL injection, XSS and other typical attack vectors.

The other type of "red team" activity is known as social engineering. In this phase, Blue Dragon get permission from the company to attempt to test the human and security defences of the company.



    resume