Penetration Test And Analysis Services

Audit service for resources (dns, ftp, e-mail, web, firewall, vpn, voip etc.) that can be accessed externally. Various tools and procedures are used with different user rights/profiles to discover possible known security vulnerabilities before attackers can exploit them. tools and procedures includes commercial and open-source vulnerability scanners, in-house developped Software, but mostly manual tests/controls by our experts equipped with experience. These procedures are based on the methodology developed and kept up to date by Cyberwise.

Audit Service performed on various entry points with different user profiles to identify misconfiguration and security vulnerabilities of internal resources, applications and infrastructure. Active Directory, Databases, virtualization platforms, voip infrastructure, client end points and other infrastructures special to customers line of work. tools and procedures includes commercial and open-source vulnerability scanners, in-house developped Software, but mostly manual tests/controls by our experts equipped with experience. These procedures are based on the methodology developed and kept up to date by Cyberwise.

Web applications should be evaluated using more advanced methods compared to other network applications due to their complex structure, variety, and variability. The main purpose is to check for misconfiguration and vulnerabilities using methodology developed by Cyberwise based on OWASP. Testing scope consist of misconfiguration, vulnerabilities, platform, logical inconsistencies, etc.

Audit service to discover vulnerabilities on mobile applications. Various tools and procedures are used with different user rights/profiles to discover possible known vulnerabilities and security risks. These procedures are based on the methodology developed and kept up to date by Cyberwise.

Targeted tests to assess the effectiveness of security/monitoring systems and observe how the security teams react to the attack. Our experts act like a real attacker to reach the goal set by the customer. Different tools used in the planned timeframe like OSINT tools, special hardware, custom malware, exploiting vulnerabilities, etc.

DoS/DDoS Tests are performed to assess the limits and capabilities, and reveal the misconfiguration of IT infrastructure. Attacks on application layer can be performed with 1000 different source IP addresses which can simulate a botnet attack.

These tests performed to determine the maximum and optimum performance a web application can deliver under heavy load. Test results includes the bottlenecks and recommendations to improve performance.

Audit service for wireless network infrastructure to determine the misconfigurations and vulnerabilities. Scope of this service includes: wireless network penetration, gain access to restricted resources from guest network, using rogue networks to gather privilege information (MITM) and configuration audit of wireless network infrastructure.

Audit service to discover vulnerabilities caused by employee actions and gaps in the organization. Most secure systems can be vunlerable because of human error. With social engineering penetration testing, we can assess the awareness level of the employees and discover human vulnerabilities. methods like phishing e-mail, phone calls, special hardware, targeted content to persuade the employees can be used. To increase the awareness level, Cyberwise Syber security awareness trainings can be planned.

Audit Service for Database systems ( ORACLE, MSSQL, MySQL, IBM DB2) to determine the misconfigurations that can cause security vulnerabilities.

Tests to check compliance of the network segmentation architecture against international standards like PCI. Rules are investigated if there are misconfiguration that can break down the segmentation architecture.

Analysis service to discover security misconfigurations in source code of customers applications written in JAVA, C#, C++ and PHP. Commercial tools are used for static code analysis and after through investigation our experts reports the problems and required changes.

Analysis service for malicious software targeting the customers environment. Scope of the service includes, determining how the malware acts, its communication patterns, spreading mechanisms, its purpose and how to completely remove it from the environment.

Analysis service for firewall rule base to fix misconfigurations. With long running deployments with multiple firewall administrators, misconfigurations and blanket rules are common. To minimize the risks and break down the blanket rules without causing any network outage it is recommended to perform a comprehensive analysis and use the analysis report for optimizing the firewall rule base.

Tools developed by Cyberwise Experts are used for generate attackes of the WAF/IPS systems to check the effectiveness of the these deployments. Test results includes Success Score that shows the misconfigurations and recommendations to fix tese misconfigurations.

SIEM softwares are very important for security monitoring purposes. Accurate and timely detection of actual attacks depends on many factors such as the correct selection of log sources, the quality of the rules created to generate alarms, and the ability to make correct correlations. Within the scope of this service, tests are carried out in accordance with the commonly used attack methods and the attack methods in the Miter Att&ck framework, checking for which of these attacks trigger alarms, whether any are incorrect, missing, or duplicate rules. As a result, the SIEM system and the monitoring team are provided with capabilities such as prioritizing the right events, increasing the attack visibility, better analyzing the attacker's behavior and taking the right action.

Main purpose of these test is to measure the effectiveness of the software and knowledge of the SOC teams with controlled attackes and measure the repsonse time of the SOC team in different situations with side-by-side exercises.

Analysis service to determine the reason of a past incident. Scope of the service includes: determining how the incident occured, which attack vectors used, which systems are effected, which vulnerabilies exploided and how to fix them.

Audit service for IOT infrastructure components. Scope of these tests includes: hardware vulnerabilities, software vulnerabilities, communication protocols, cloud infrastructure security, vulnerabilities of API services and mobile applications.