Our scans are designed to test your defenses within  the SVAPE & C attack model – also explained at



Scan first (check what ports are open – tcp/udp 1-65536 – there can only be 65536 ports as 2 bytes create the number 2^16)   (this is the Alpha scan)

Vulnerability Analysis   Analyse the port and review how it  behaves, grab the banner etc.) (this is the Sigma Scan)

Penetrate (use the Vulnerability analysis to find something to attack)  (this is Omega scan)

Exploit (attack and get on the system)   (this is Omega scan)  

& Control   (keep accessing the hacked computers)  (As ethical hackers we don’t do this)



Mentor future Ethical Hackers on your staff


Last edit 10/31/15

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.