Safe Networks, Healthy Operations

Protect your networks to keep building trust among your clients.

 

Schedule a one-hour consultation with one of our experts to find out what we can do for you.

Identify reachable hosts
Identify reachable hosts
We map all hosts directly accessible from the internet.
Conduct a service scan
Conduct a service scan
Identify the systems compromised.
Enumeration
Enumeration
Our experts extract as much information from the target system.

A toolset for rapid and methodological collection

We perform vulnerability assessments for networks connected to and accessible through the public Internet as well as internal systems.

RHEA Group has developed a toolset that allows for rapid, methodical collection of vulnerability data from target networks and devices. This toolset is a collection of commercial, open source, and proprietary tools, allowing flexibility and customization for each clients specific environment.

These activities will create a map of the targets. The host system will be treated in the same way a hacker would treat it. Typical activities will consist of:

  • Identify reachable hosts We map all hosts directly accessible from the Internet
  • Conduct a service scan -This scan includes determining what service ports are present and listening on each identified device to determining the type of operating systems and applications in use.
  • Enumeration We extract as much information as possible from the target system. This includes information specific to a listening port.

Results from these tests will guide the testing processing, but will not provide the conclusive results of our analysis generally, broad network scanners of this type are vulnerable to false negative and false positive results; we validate all findings so that only true data is presented.

A toolset for rapid and methodological collection
Schedule a one-hour consultation with one of our experts to find out what we can do for you