Insight into publicly available information

Identification of critical and vulnerable systems

Practical advice from specialists

In brief

The internet is continuously "scanned" and the results of this can often be found in public sources. During this research, we will dig into this in order to map out the "exposure" of your organization from a security perspective. We use the OSINT-Framework. We will search the internet for information related to your organization, about systems, people, documents, backups, passwords, archives and so on.

Working method

Our investigations into external corporate networks go through these phases:

  • Converstation
    We start with a discussion about the collaboration and test approach.
  • Examination
    We look for sensitive information related to your organization in various public sources.
  • Documentation
    We document our findings and personalized advice in a comprehensive test report.
  • Handover
    We hand over the report, discuss the main points with you and think along about pragmatic solutions.
  • Next steps
    We will discuss possible follow-up steps with you. We also recommend that after the "external" investigation, a "Security research corporate network (internal)" first.
  • Aftercare
    We remain available to you for questions, retests and advice.


Organizations and corporate networks differ from each other. Large organizations require more analysis work than smaller ones. That is why an investigation into your external company networks requires a tailor-made proposal.

Of course there is the possibility to limit the scope of the research if you want to manage costs. We are happy to inform you about this.

To get going

Do you want insight into the publicly findable information about your organization?
Then contact us now for a no-obligation introductory meeting.