Vulnerability Testing
Customized exploitation and testing work to your environment and goals.
Areas explored: Infrastructure Security & Application Security
|
|
Infrastructure Security: |
- External network vulnerability assessments
- Internal network vulnerability assessments
- Wireless security assessments
- RDP assessments
- Network architecture and firewall review
- Host and network device review
|
|
Application Security: |
Application vulnerability assessment is to identify and remediate vulnerabilities and maintain a resilient web presence. This process involves:
|
- Web and client-server application security assessments.
- Mobile application assessments across most platforms.
- Software development lifecycle (SDLC) reviews
- Application architecture assessments
- Custom services as requested
|
Methodology
>
<
I. Data Gathering & Project Set up
1. Review of the project assumptions
2. Detail list of IP addresses for scan
3. Arrange to configure (IDS/IPS) to accept the originating IP address
4. Optional scan using User credentials
5. Contact information for both parties
6. Plan the scans including time-of-day
II. Conduct Vulnerability Scans
1. Perform an in-depth scan of the IP addresses provided and any optional User credential scans to identify security weaknesses and vulnerabilities
III. Vulnerability Research & Verification
1. Verify all vulnerabilities discovered
2. Determine the potential impact of exploited vulnerabilities
3. Prioritize remediation efforts
4. Generate specific recommendations for remediation.
|
|
|
|