usd HeroLab Toolchain

 

We place the highest demands on the quality of our work. To ensure that security analyses are always carried out with constant efficiency and quality, our own tools are subject to strict quality management and optimization processes, taking into account the results of our research.

usd Icebreaker

Analysis tool for all team members & knowledge database.

Implementation of plugins & self developed scripts
 
Analysis tool for all team members & knowledge database
 
Continuous development and adaption to research results
High level of automation of manual processes
“Scanner”/automation engine
Combines the best publicly available tools and usd in-house developments
Consistently high quality level

usd ExPeRT

Project planning and collaboration support for all team members.

Mapping of our long-standing and proven internal processes

 

Integrated checklists
Status tracking & resource management

 

Project planning & collaboration
Importing data from usd Icebreaker

usd Reporting Tool

Results prepared by our analysts.

Consistent high quality reports

 
 

Detailed explanation of identified vulnerabilities
Instructions on how to verify the vulnerability

 

Data import from usd ExPeRT
Concrete recommendation of measures to remedy the vulnerability

Cyber Security Transformation Chef (CSTC)

This Burp Suite plugin enables penetration testers to efficiently analyze complex web appliactions.

remote-method-guesser: A Java RMI Vulnerability Scanner

The open source tool "remote-method-guesser (rmg)" is a Java RMI vulnerability scanner looking for misconfigurations in Java RMI endpoints.

SNC Scan

The SNC Scan enables the analysis of the SAP Secure Network Communication (SNC) protocol and identifies insecure configurations.

FlowMate

The BurpSuite plugin FlowMate increases coverage in web pentests through data flow analysis and automated evaluation.

usd PentestLab

Our training and education environment

Pentesters can train their methodical skills, creativity and endurance in real life pentesting, using a continuously growing number of preconfigured server environments, various technologies and vulnerabilities of varying difficulty levels. No isolated tasks. No reports. No jury. Only skill counts. The PentestLab is not only used by our own pentesters, but also serves as a training environment for our clients during CST Academy events, and is the basis for our regular Hackers’ Days designed for students and universities.

Optimal support

The basis for an efficient process and vulnerability management is the integration of the platform into your company. Your assets, primary contacts and the status of your pentests are displayed here. We are happy to support you during the rollout and train your employees if desired. Acting as partners. Transparent, secure and efficient.