Network Testing
  • The test will attempt to ​
    • identify vulnerabilities that arises from security misconfigurations or missing patches​
    • manual exploitation of exposed services, and ​
    • look for general security vulnerabilities.​
  • Performed using automated and manual testing. ​
  • Automated scanner/tool results will be analysed and false positives findings will be removed. ​

Network Security Vulnerability Assessment & Penetration Test

Network vulnerability assessment and penetration testing evaluates your organisation’s network infrastructure for known vulnerabilities that arises from security misconfiguration or missing patches. The assessment will test for vulnerabilities in servers and network devices such as web and database servers and firewalls.

Learn more

Wireless Security Penetration & Discovery Test

Wireless access points if not configured correctly can be a route for hackers to penetrate your organization’s network without physical access to your office. A wireless penetration test will identify weakness or vulnerability in the access point’s configuration and setup. The test will discover rouge access points connected to your network.

Learn more
I am interested, request call back

Network Security Vulnerability Assessment & Penetration Test​

Network vulnerability assessment and penetration testing evaluates your organisation’s network infrastructure for known vulnerabilities that arises from security misconfiguration or missing patches. The assessment will test for vulnerabilities in servers and network devices such as web and database servers and firewalls.Based on the identified weaknesses, guidance that conforms to industry best practices will be provided to help remediate the security gaps identified. This safeguards your organisation’s network infrastructure from known external and internal attacks.

Key benefits:
  1. Improves the network security
    • Identify server patches to apply and pin point areas where security needs to be improved
  2. Prevents revenue loss due to server downtime
    • Avoid losses resulting from attacks and server downtime
  3. Protect organization and customer data
    • Help prevent data breaches and losses that put your business at risk
    • Build customer confidence
  4. Addresses compliance requirements
    • Ensures that your network infrastructure is compliant to industry standards or follows industry best practices
  5. Comprehensive reporting
    • Summary of your network security posture
    • Details on the identified weakness and corresponding remediation advice
    • Risk rating to help prioritise the remediation
Network vulnerability assessment checks for:
  • Anonymous or Guest Access
  • CGI Abuses Including XSS
  • Default Accounts
  • Denial of Service Vulnerabilities
  • FTP Misconfiguration
  • Open Administrative Interfaces
  • Ports Identification
  • SMTP Vulnerabilities
  • SSL Certificate Issues
  • TCP/IP Stack Vulnerabilities
  • Unnecessary Services
  • Vulnerable Services
  • XSS
  • Backdoors
  • CISCO Security Weaknesses
  • Default Configurations
  • DNS Vulnerabilities
  • Information Leakage
  • Operating Systems Security Weaknesses
  • Remote File Access
  • SNMP Access and Vulnerabilities
  • SSL Ciphers Supported
  • Timing Evasion
  • Unsupported Services
  • Weak configurations
  • Buffer Overflows
  • Database Vulnerabilities
  • Default Passwords
  • Firewall Vulnerabilities
  • Missing Patches
  • Peer-to-Peer Services
  • RPC Services
  • SQL Injection
  • SSL Protocols Supported
  • Unencrpyted Protocols
  • User Management Weaknesses
  • Web Server Vulnerabilities

Wireless Penetration Testing

Wireless access points if not configured correctly can be a route for hackers to penetrate your organization’s network without physical access to your office. A wireless penetration test will identify weakness or vulnerability in the access point’s configuration and setup. The test will discover rogue access points connected to your network.

Key benefits:
  1. Improves the network security
    • Identify security configuration weaknesses and rogue access points
  2. Prevents revenue loss due to server downtime
    • Avoid losses resulting from attacks and server downtime
  3. Protect organization and customer data
    • Help prevent data breaches and losses that put your business at risk
    • Build customer confidence and loyalty
  4. Addresses compliance requirements
    • Ensures that your network infrastructure is compliant to industry standards or follows industry best practices
  5. Comprehensive reporting
    • Summary of your network security posture
    • Details on the identified weakness and corresponding remediation advice
    • Risk rating to help prioritise the remediation
The wireless network vulnerability assessment includes:
  • Discovery of rogue access points in the Wireless LAN
  • Discovery of unsafe activity or configuration
  • Possible penetration into the internal wired LAN through wireless
  • Discovery of wireless network encryption vulnerabilities and weakness
  • Discovery of network services and other network devices accessible from the wireless access point
  • Possible packet injection and wireless flooding
  • Discovery of vulnerabilities on the wireless network authentication
  • Determines the level of risk associated with the physical security of the wireless access point
  • Determines the level of risk associated with the setup of the wireless access point