Between
This report contains our findings as well as detailed explanations of exactly
how
The scope of the penetration test was limited to the following target:
...
The Security Audit took place between
Through automated scans we were able to gain the following information about the software and infrastructure. Detailed scan output can be found in the sections below.
As part of our active reconnaissance we used the following automated scans:
We have identified the following issues:
In this section we list some of the things that were tried but turned out to be dead ends.