Home | Services | Attack Simulation | Credential Scan
The Credential Scan identifies insecurely stored passwords at an early stage and clearly indicates where action is needed. This allows you to prioritize vulnerabilities and minimize risks in a targeted manner.
Our security experts plan the Credential Scan and actively carry it out. Relevant findings are specifically examined and evaluated to ensure accurate results.
The Credential Scan provides you with a valuable basis for internal guidelines and external standards such as ISO 27001. The results will help you to meet compliance requirements and pass audits successfully.
The results provide a reliable basis for KPIs, trends, and reporting. Managers can thus compare progress and steer measures based on data.
The results are directly incorporated into training courses and short learning modules. Employees can thus train secure password practices and reduce everyday sources of error.
The insights gained can be directly translated into guidelines, processes, and follow-up scans. This allows you to achieve a lasting effect and increase password security in the long term.
Identifying passwords stored in plain text is only the first step. Using our powerful system, which was designed specifically for this purpose, we perform a complex analysis of your password hashes. This involves password cracking to reliably identify insecure passwords. For more information, please visit our website at Password Audit.
The Credential Scan reveals where passwords are stored unprotected and checks whether internal security guidelines are being followed. This provides you with a clear basis for implementing prioritized measures in a targeted manner and reducing cyber risks in the long term.
The Credential Scan can be performed on a wide variety of data sources, such as network drives, file systems, or email inboxes. Compressed or archived files can also be analyzed. This gives you a comprehensive picture of potential password risks.
Yes. The Credential Scan is of low risk and does not cause any changes to your data or systems. Our experts carefully prepare the scan, actively monitor it, and ensure that your infrastructure remains protected at any time.
While Microsoft Purview also searches for passwords, it requires complex setup and ongoing maintenance, whereas eDiscovery works primarily with keywords. Our Credential Scan, on the other hand, is quickly set up, specializes in plaintext passwords, and supports a much wider range of file formats – including archives.
Many companies start with a one-time scan to gain an initial overview of potential vulnerabilities. However, for a sustainable security strategy, we recommend regular checks, as new work habits and changes in data storage can create new risks at any time.
The Credential Scan by Oneconsult provides you with a comprehensive overview of unprotected passwords in your databases. You receive precise findings, prioritized recommendations, and a reliable basis for implementing targeted technical and organizational measures.
Upon request, our security experts can also assist with follow-up scans and evaluations. This allows progress to be measured, risks to be permanently reduced, and security standards to be continuously improved.
If you want to know the true standing of your company, the Credential Scan is the first step towards greater transparency and security.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here:
Don’t miss anything! Subscribe to our free newsletter.