ehcgroup.io
Open in
urlscan Pro
159.65.33.102
Public Scan
Submitted URL: http://ehcgroup.io/
Effective URL: https://ehcgroup.io/
Submission: On June 25 via api from GB — Scanned from GB
Effective URL: https://ehcgroup.io/
Submission: On June 25 via api from GB — Scanned from GB
Form analysis
11 forms found in the DOMPOST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Security Penetration Testing"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>
POST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Audit and Certification of ATMs"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>
POST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Computer Forensics"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>
POST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Advice Computer Law"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>
POST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Specialized Audits"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>
POST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Computer Intelligence"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>
POST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Security Training"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>
POST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Big Data Solutions"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>
POST /contact
<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="partnership"><input type="hidden" name="topic" value="contact"><input type="text" name="email"
placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="comments"></textarea><input type="submit" value="Send"></form>
POST https://ehcgroup.us17.list-manage.com/subscribe/post?u=f0a96b2ae5161c05a2d854810&id=841ab085d8
<form id="subscription-form" action="https://ehcgroup.us17.list-manage.com/subscribe/post?u=f0a96b2ae5161c05a2d854810&id=841ab085d8" method="post" target="_blank" novalidate=""> <label>Security Newsletter</label> <input type="email" value=""
name="EMAIL" placeholder="Email"> <input hidden="" type="text" name="b_f0a96b2ae5161c05a2d854810_841ab085d8" value=""> <button type="submit">Subscribe</button> <button
type="button"><a href="http://feeds.feedburner.com/BlogEhcgroup" target="_blank">RSS Feed</a></button></form>
<form><input type="text" name="name" placeholder="Name"><input type="text" name="email" placeholder="Email"><textarea rows="10" cols="28" name="message" placeholder="Comments"></textarea><input type="submit" value="Send"><input type="hidden"
name="category" value="contact"><input type="hidden" name="topic" value="contact"></form>
Text Content
* Home * About * Services * Products * Training * Events * Partnership * EHC News * Contact EnglishEspañol * Home * About * Services * Products * Training * Events * Partnership * EHC News * Contact Computer Forensics and Computer Crimes * Advice on computer crimes. * Investigation of high technology crimes. * Forensic computer analysis. * Forensic analysis of mobile devices. LEARN MORE Compliance Audit PCI (PA-DSS) * Audit of source code. * Authentication mechanisms. * Data Encryption. * Storage security. LEARN MORE Become a Certified Ethical Hacker * Practical courses. * Laboratories virtualized. * Lessons recorded with audio and video. * Teachers recognized internationally. * E-learning web platform. * Online support in 3 languages. LEARN MORE Mobile Applications Audits * Malware analysis. * Transportation security. * Reversing applications. * Audit of banking applications. LEARN MORE Computer Forensics and Computer Crimes * Advice on computer crimes. * Investigation of high technology crimes. * Forensic computer analysis. * Forensic analysis of mobile devices. LEARN MORE Compliance Audit PCI (PA-DSS) * Audit of source code. * Authentication mechanisms. * Data Encryption. * Storage security. LEARN MORE Become a Certified Ethical Hacker * Practical courses. * Laboratories virtualized. * Lessons recorded with audio and video. * Teachers recognized internationally. * E-learning web platform. * Online support in 3 languages. LEARN MORE Mobile Applications Audits * Malware analysis. * Transportation security. * Reversing applications. * Audit of banking applications. LEARN MORE Computer Forensics and Computer Crimes * Advice on computer crimes. * Investigation of high technology crimes. * Forensic computer analysis. * Forensic analysis of mobile devices. LEARN MORE Compliance Audit PCI (PA-DSS) * Audit of source code. * Authentication mechanisms. * Data Encryption. * Storage security. LEARN MORE Become a Certified Ethical Hacker * Practical courses. * Laboratories virtualized. * Lessons recorded with audio and video. * Teachers recognized internationally. * E-learning web platform. * Online support in 3 languages. LEARN MORE Mobile Applications Audits * Malware analysis. * Transportation security. * Reversing applications. * Audit of banking applications. LEARN MORE About At the start of 2001, born Ethical Hacking Consultants, with the firm commitment to support in the management of information security projects, from the analysis and evaluation of the security of the systems and infrastructures, to the implementation of robust security solutions that allow the integration of processes, technology and human resources in our clients. As specialists in protection of information assets, our mission is to support our clients in covering the three major areas of information security and information: confidentiality of information, data integrity and availability of computer systems. Ethical Hacking Consultants is made up of first class human capital and certified in different areas of security. With security professionals from different countries and certified in several areas of security, we have a first-hand experience in the area of the protection of digital assets, training of the human resources of the clients and we develop under the pillars of the ethics professional. Services * External intrusion testing. * Internal intrusion testing. * Wireless intrusion testing. * Social engineering intrusion testing. * ATM intrusion testing. * SAP systems intrusion testing. * SCADA systems intrusion testing. These intrusion tests are also known as Ethical Hacking or Pentesting. LEARN MORE Thank you for your interest in our services and technological solutions. Please fill the following form and a commercial agent will contact you to assist you within the first two workings days. * Audit of VISA, MASTERCARD, PROSA controls. * Audit of PCI-DSS, PA-DSS, PCI-PTS, ISO 8583 controls. * Audit of protections and perimeters of ATMs. * Audit of operating system and applications of ATMs. * Security Audit in Binaries and Anti-Malware of ATMs. * Audit of Frequency spectrum of ATMs. * Audit of Communications and standards of ATMs. We are the only company that has created more than 300 controls to audit ATMs. LEARN MORE Thank you for your interest in our services and technological solutions. Please fill the following form and a commercial agent will contact you to assist you within the first two workings days. * Computer Expert report. * Judicial rulings Computer. * Legal expert counterparts. * Computer arbitrations. * Preliminary or extrajudicial arbitration. * Insurance: Risk assessment or IT damage. * Recover of deleted information. We preserve the digital evidence adequately so that it has judicial and legal value. LEARN MORE Thank you for your interest in our services and technological solutions. Please fill the following form and a commercial agent will contact you to assist you within the first two workings days. * Research and sponsorship in Computer Crime cases. * Analysis and elaboration of computer contracts. * Copyright on the Internet. * ODR - Online Dispute Resolution. * Electronic Commerce and trustmarks. * Electronic signature. * Infringement of privacy by computer or electronic means. * Scam, fraud or computer conspiracy. LEARN MORE Thank you for your interest in our services and technological solutions. Please fill the following form and a commercial agent will contact you to assist you within the first two workings days. * Audit to Servers and Data Centers. * Data Network Audit (LAN, WAN, Wireless, VoIP). * Audit to Web Applications and the process of secure development. * Mobile applications Audit. * Perimeter Security Audit. * Binary Code audit. * Compliance Audit PCI-DSS v3.0. * Compliance Audit ISO 27001/27002. LEARN MORE Thank you for your interest in our services and technological solutions. Please fill the following form and a commercial agent will contact you to assist you within the first two workings days. * Training of intelligence corps. * Cyber intelligence services(CYBINT). * Communications Intelligence services(COMINT). * Training of Human Intelligence(HUMINT). * Development of Cyber Incident Response Centers. * Development of Monitoring Centers and Security Centers. These services are offered only to governments. LEARN MORE Thank you for your interest in our services and technological solutions. Please fill the following form and a commercial agent will contact you to assist you within the first two workings days. * Certified Professional Pentester. * Web Application Security Auditor. * Expert in Computer Crime and Computer Forensics. * Lead Auditor ISO 27001. * Metasploit Profesional Pentester. * Wireless Network Defense Professional. * ATMs Lead Security Auditor. * Cyber Security Multivendor ATM. LEARN MORE Thank you for your interest in our services and technological solutions. Please fill the following form and a commercial agent will contact you to assist you within the first two workings days. * Asymmetric: Big Data Security Analytics. * ATM Risk Operation Center. * Security Center Log Manager. * Analysis and Detection of Fraud in Telecommunications. * Integration of SIEM Systems with Big Data. * Big Data Solutions in the Cloud. * Threat Monitoring Center for IT infrastructures. * Development of Splunk and Hadoop solutions. LEARN MORE Thank you for your interest in our services and technological solutions. Please fill the following form and a commercial agent will contact you to assist you within the first two workings days. Security Penetration Testing Audit and Certification of ATMs Computer Forensics Advice Computer Law Specialized Audits Computer Intelligence Security Training Big Data Solutions Products * Persistent pentesting solution on cloud. * Security and threat monitoring 24/7, 365 days of the year. * Identification of web technologies and search of exploits. * Dashboard and Customizable alerts. * Discovery of IoT devices and certificate analysis. * Programming of pentesting tasks. * Vulnerability reports and PCI compliance v3.2. WEBSITE * Electronic signature of documents. * Certified email. * Testigo Digital Online (Notario Web). * Electronic Signature of Transactions. * Electronic Invoice Stamping. * HTTP Secure Stamps. WEBSITE BLACKFOG is a security and privacy tool. * Secure your remote computers and data. * 100% fileless protection. * Multiple layers of defense. * Ransomware protection. * Device privacy. * Cryptojacking protection. IR AL SITIO SealPath is a data-centric security tool for your company. * Protect and control corporate data wherever it travels * Control who accesses your data, when and with what permissions * You can see the details of the accesses to the documents. IR AL SITIO With our new service, we provide to security managers with answers to urgent questions, which are necessary to accurately evaluate your organization's cyber posture, on an ongoing basis. * New brand service. IR AL SITIO SafeData is a Personal Data security management system service. * Consulting, training and auditing services. * PDP diagnoses include Pentesting tests. * Minimize errors or failures in the processing of Personal Data. IR AL SITIO Pentest365 Firmanza - your trust signature Blackfog SealPath RedTeam Safedata * 2021 * 2022 * 2023 * April * May * June * July * August junio 2022 LMXJVSD 123456789101112131415161718192021222324252627282930 Training Events EHC Group not only strives to provide the best services in the area of Computer Security, It is also dedicated to sharing and disseminating knowledge through events, training and security certifications, CTF's and talks, with a presence in 7 countries in Latin America and the United States providing high security services in technologies. * We actively participate in more than 80 events. * We visit more than 15 countries. * We make a community in cybersecurity. * We share knowledge and experiences. Ethical Hacking Consultants is not only a Company Partnership EHCGroup services are managed by several strategic partners around Latin America, the US and Canada through our channel program. If you are interested in representing our products to your customers, you can fill out the following form and a business agent will contact you within the first two working days. * * nameCerty Group * emailrfernandez@certygroup.com * phone+1 809-793-1124 * websitewww.certygroup.com * * nameIntegsa * emailservicio@integsa.com.mx * phone+52 81 1100 1150 * websitewww.integsa.com.mx * * nameADSI * emailinfo@adsintl.net * phone+1 954 889 1366 * * nameInfinyt * emailinfo@infinyt.mx * phone+52 (81) 2474-5555 * websiteinfinyt.mx * * nameBushido Security * emailinfo@bushidosec.com * phone(+57) 3182704207 * websitebushidosec.com * * nameREDTISEG * emailcontacto@redtiseg.com * phone+591 62674446 * websitewww.redtiseg.com COMPANIES THAT RELY ON ETHICAL HACKING CONSULTORES. EHC NEWS * Conti ransomware finalmente cierra la fuga de datos, los sitios de negociación * CISA: Los exploits Log4Shell todavía se utilizan para piratear servidores VMware * Dos actualizaciones de MS para la misma vulnerabilidad en RDP * NSO confirma que el spyware Pegasus es utilizado por al menos 5 países europeos * Hackers rusos explotan la vulnerabilidad de Microsoft Follina contra Ucrania * Investigadores descubren formas de descifrar el cifrado del servicio de almacenamiento en la nube ‘MEGA’ Security Newsletter Subscribe RSS Feed To navigate, press the arrow keys. Styled Map Keyboard shortcuts Map DataMap data ©2022 Google 100 m Terms of Use Report a map error Map data ©2022 Google Contact Punta Pacífica, Torre de las Américas, Torre B, piso 7, Oficina 704 +507 3873850 info@ehcgroup.io You can also contact us by filling out the following form with your comments. By filling up you agree to our privacy policy. Privacy policy TWITTER * @EHCGroup ¿Pentest con potencia de más de 1000 pentesters, trabajando 24Hrs, todos los días del año? Conoce n... [more] 3/1/2021 * @EHCGroup La operación de ransomware Conti finalmente cerró su última infraestructura pública, cerrando el cap... [more] 6/24/2022 * @EHCGroup Nuestra solución @pentest365 es una herramienta preventiva que trabaja en tiempo real, le permite an... [more] 6/24/2022 flag{Yeah! you find the EHC Flag} * Wait a moment, we're processing your request * Oh snap! Please Change a few things up and try submitting again. * Well done! You successfully contact with us. In a moment We'll respond you. * Your browser is in spanish Change to spanish?YesNo