Security Testing and Vulnerability Assessment
Defeating Hackers at Their Own Game

Gold Lock evaluates the security of a computer system or network by simulating an attack from a malicious source (hacker).

The process involves an active analysis of the system from the position of a potential attacker for any potential vulnerability that could result from improper system configuration, outdated hardware or software flaws, or operational weaknesses in process or technical countermeasures.

Any security issues that are found are confidentially presented to the system owner, together with an assessment of their impact, and with a detailed proposal for a quick resolution of the discovered breach.

The intent of a penetration test is to determine the feasibility of an attack and the amount potential damage of a successful exploit, if discovered.


Depending on the scope of work, a typical report would include any or all of these components:

Network Security

  • Network Surveying
  • Port Scanning
  • System Identification
  • Services Identification
  • Vulnerability Research & Verification
  • Application Testing & Code Review
  • Router Testing
  • Firewall Testing
  • Intrusion Detection System Testing
  • Trusted Systems Testing
  • Password Cracking
  • Denial of Service Testing
  • Containment Measures Testing

Social Engineering

  • Request Testing
  • Guided Suggestion Testing
  • Trust Testing
Wireless Security

  • Wireless Networks Testing
  • Cordless Communications Testing
  • Privacy Review
  • Infrared Systems Testing

Communications Security

  • PBX Testing
  • Voicemail Testing
  • Modem Testing

Physical Security

  • Access Controls Testing
  • Perimeter Review
  • Monitoring Review
  • Alarm Response Testing
  • Location Review
  • Environment Review