• Home

  • Become a partner

  • Products

  • Services

  • About Us

  • Press Releases

  • Blog

  • Contact Us

2. Network Security

Network Security & Penetration Testing Program

Network penetration testing services provided by highly qualified and skilled security experts helps enterprises in securing their network. Examining the security posture of Assets is the main goal of the Network Security Program.

DeTaSECURE will conduct an external attack and penetration review exercise targeting the department's internet-accessible IP address by conducting non-intrusive and non-destructive penetration testing from the perspective of an unauthorised user connected to the internet with the goal of accessing information that is only available to authorised users and/or gaining privileged access to the infrastructure.

Vulnerability Assessment Approach
  1. Discovery (Mapping) - Identify the list of live nodes in the network
  2. Asset Prioritization (Allocation) - Classify assets based on criticality to business
  3. Assessment / Services Scan
    • Identify common UDP services running on the hosts and all listening TCP ports
    • Identify the services / Operating System found running & their version
    • Identify vulnerabilities in the services enumerated during the above steps
  4. Reporting - Report the loop holes in the infrastructure along with recommendations to plug them
  5. Remediation (Fixing loop holes) - Address the vulnerabilities identified based on the recommendations
  6. Re-Testing - Repeat Activity 1 to 5 and conduct a full re-scan on a quarterly/bi-annually basis
Penetration Testing Approach
  1. Information Gathering
    • Identify IP range information
    • Backend database and OS details
    • Open ports, active services and version
  2. Network Mapping
    • Enumerate Network
    • DNS Enumeration
    • Identify different network segments
    • Perform “Footprint analysis” of network
  3. Vulnerability Scanning
    • Perform vulnerability scanning using DeTaSECURE proprietary and commercial tools
    • Validate identified vulnerabilities
  4. Exploitation
    • Reviewing existence of any backdoor entries
    • Reviewing existence of any known vulnerabilities & CVEs
    • Gaining access of target machine
    • Remove False positive vulnerabilities form VA data
    • Recreating the attacks, Confirming attacks taking evidences and POCs
  5. Reporting
    • Building security tackers and dashboard
    • Sharing reports
    • Report identified vulnerabilities / security flaws / weaknesses in infrastructure components along with the possible impact, root cause and remediation process. For each identified weakness, a risk rating would be assigned primarily based on the probable business impact and significance of occurrence. All the test would be done with prior approval from Organization.

Let’s discuss about how we can help make your business better

Contact Us