Our Services

Providing Best Cyber Security Solutions

At 99HAT, we specialize in offensive penetration testing, offering a unique approach to strengthen your cybersecurity defenses. By simulating real-world breaches, we provide a comprehensive assessment of your network's vulnerabilities, uncovering weaknesses before they can be exploited by malicious actors.

To validate the resilience of your security measures and to transform your vulnerabilities into strengths, contact us. Together, we can build a more secure digital future for your business.

Primary Services

Adversary Simulation & Resilience Services

99HAT offers a range of Adversary Simulation services to provide a realistic assessment of an organisation's ability to protect against, and respond to, modern adversaries targeting their.

 

Read More

Penetration Testing Services

The Penetration Testing services provided by 99HAT cover a wide range of both internally and externally exposed environments. Conducting penetration testing on a regular basis helps ensure.

 

Read More

Ransomware Emulation

During a ransomware emulation, our red teamers simulate various stages of a ransomware attack, such as initial infection, privilege escalation, lateral movement, data encryption and data exfiltration.

 

Read More

Source Code Review

A review of application source code provides an effective method of identifying insecure development patterns, logic flaws, and other subtle vulnerabilities that can be missed during application.

 

Read More

Wireless Security Testing

99HAT are able to perform security testing across a wide range of wireless technologies covering Wi-Fi, Bluetooth, RFID and NFC standards. Utilising specialist hardware and software tools.

 

Read More

Application Security

Our web / mobile security testing team have the skills and experience to conduct comprehensive security reviews across a wide range of web and mobile applications on all modern platforms.

 

Read More

Cloud Security

The team at 99HAT possesses a wide array of knowledge and extensive experience in testing AWS, Azure, GCP, Salesforce, Office365, and most other modern Cloud Services that are widely utilized by enterprises.

 

Read More

ICS (SCADA)

The Penetration Testing of security controls within Industrial Control Systems (ICS) environments is a necessary, but challenging task, balancing the needs of availability with robust access control, resilience, and accountability.

 

Read More

Environment Security Testing

Deploying a secure environment for users is challenging, and the 99HAT team has the skills to identify weaknesses that could lead to unauthorized access. Using internally developed methodologies and tools, along with up-to-date knowledge, the testing team reviews standard and non-standard deployments across various tech stacks.

 

Read More

Password Strength Review

Using specialist hardware specifically designed for password cracking, 99HAT is able to conduct a password strength review of an organisations stored passwords, including Active Directory. This assists in the identification of insecure passwords, bad password patterns, and other password weaknesses.

 

Read More

Industry Standards

How we work?

Scope and sign off

The initial contact, scoping, and the creation of the statement of work, are handled by our engagement team with input from a technical consultant.

Project planning

Our projects team become the primary point of contact and are responsible for handling scheduling, gathering pre-requisites and managing the delivery of the review.

Completion and reporting

The technical team will complete the review and produce a set of reports, which will then pass through several stages of technical review and quality assurance.

Follow up

Once the report is delivered, our team are available to do a walkthrough of the findings, answer questions, or provide re-testing of any remediation actions.