Network Vulnerability Assessment & Penetration Testing

Network vulnerability assessment and penetration testing evaluates your organisation’s network infrastructure for known vulnerabilities that arises from security misconfiguration or missing patches. The assessment will test for vulnerabilities in servers and network devices such as web and database servers and firewalls.Based on the identified weaknesses, guidance that conforms to industry best practices will be provided to help remediate the security gaps identified. This safeguards your organisation’s network infrastructure from known external and internal attacks.

Key Benefits
Improves the network security
  • Identify server patches to apply and pin point areas where security needs to be improved
Prevents revenue loss due to server downtime
  • Avoid losses resulting from attacks and server downtime
Protect organization and customer data
  • Help prevent data breaches and losses that put your business at risk
  • Build customer confidence
Addresses compliance requirements
  • Ensures that your network infrastructure is compliant to industry standards or follows industry best practices
Comprehensive reporting
  • Summary of your network security posture
  • Details on the identified weakness and corresponding remediation advice
  • Risk rating to help prioritise the remediation
Network vulnerability assessment checks for:
Anonymous or guest access
Backdoors
Buffer overflows
CGI abuses including XSS
CISCO security weaknesses
Database vulnerabilities
Default accounts
Default configurations
Default passwords
Denial of service vulnerabilities
DNS vulnerabilities
Firewall vulnerabilities
FTP misconfiguration
Information leakage
Missing patches
Open administrative interfaces
Operating systems security weaknesses
Peer-to-peer services
Ports identification
Remote file access
RPC services
SMTP vulnerabilities
SNMP access and vulnerabilities
SQL Injection
SSL certificate issues
SSL ciphers supported
SSL protocols supported
TCP/IP stack vulnerabilities
Timing evasion
Unencrypted protocols
Unnecessary services
Unsupported services
User management weaknesses
Vulnerable services
Weak configurations
Web server vulnerabilities
XSS
Top