Secure Your Network with Penetration Testing!
Penetration testing is a attack simulation from inside or outside the system to see vulnerabilities and take protection before the real attack occurs.
To keep security skills of the company at high level
To see attacks from outside and take protection
To keep secure of the system investment
To prevent information loss that can be caused by security vulnerabilities
BlackBox; Black box testing assumes no prior knowledge of the infrastructure to be tested. (Simulating outside attackers).
WhiteBox; White box testing provides the testers with complete knowledge of the infrastructure to be tested, often including network diagrams, source code, and IP addressing information. (Simulating employees)
GreyBox; Grey box testing analyzes possible potential harm to the system from unauthorized user in internal network.
Determining the DNS Server
Zone Transfer Tests
Reading records with DNS Bruteforce
DNS Subdomain Detection
DNS Cache poisoning tests
E-Mail Title Analysis
Fake E-mail Access tests
E-Mail Server Vulnerabilities tests
E-mail accounts password tests
E-Mail Server Malware testing
SMTP Relay Tests
Blacklist Controls
Detection of services open to the Internet
Testing of weaknesses of services
Password tests for services
Testing the weaknesses of services
E-Mail Title Analysis
Fake E-mail Access tests
E-Mail Server Vulnerabilities tests
E-mail accounts password tests
E-Mail Server Malware testing
Server Room
Workspaces
Network infrastructure
Computer based social engineering tests
Human-based social engineering testing
Phishing methods application and detailed reporting
SSID Detection
Detection of Encryption Types
Detecting clients connected to Wireless Network
Wireless Network Listening tests
Password testing against WEP encryption
WPA & WPA2 Cipher tests against encryption
WPA Enterprise Cryptographic password testing
Password testing against 802.1x encryption
WPS Service tests
Fake Access Point Tests
Wireless Signal Distortion tests
Password security tests with corporate services
SYN Attack
ICMP DOS Attack
HTTP DOS Attack - GET, POST
DNS Dos Attack
UDP Dos Attack
Smurf Attack
DNS Elevated Attacks
Web Application Installation Tests
Analysis of data entry forms
Analysis of data output
Performing authentication tests
Session management and Authorization tests
Cross-site scripting (XSS) tests
SQL Injection tests
Command Injection tests
Error management tests
CSRF Tests
WAF Detection
WAF Jumping tests
Network mapping
Determine the operating systems at the Network
The roles of detected systems and devices
Detecting open ports
Determine the services on open ports
Testing of vulnerabilities
Unauthorized access to the system using the identified vulnerabilities
Determination of authorized network traffic
Filtration bypass tests
Controls for guest access policies
ARP Poisoning tests
Network Protocol usage analysis
Extracting important data from network traffic
Session replay tests
Privilege Escalation Tests
USB and CD Usage Policy
Boot controls
Filtering bypass tests
Usage areas password detection
Unauthorized access controls
Database access password attempts
Unauthorized access tests
MySQL
MSSQL
Oracle
Sybase
IBM Db2
Bg-Tek Penetration tests are compatible with industry standard certification programs and standards.
CEH, LPT (Eccouncil), CISSP (ISC2), CPT (IACRB), PCI, PTES, TIGERSCHEMA, OWASP, ISACA, OSSTMM, CREST
PCI Scanning Procedures
The Penetration Testing Execution Standard
Security Standards Council
Transactions are reported at the end of working hours on a daily basis
Vulnerabilities and Exploits
To reach unauthorized data and traffic abnormalities
After penetration test, the vulnerabilities and the solutions are reported.
Includes Determination of security policies and contains suggestions for implementation.
Once the security test has been completed and the report has been submitted, the institution may request a re-verification test, stating that the weaknesses have been closed.
Verification test The safety test is applied to verify whether the detected weaknesses in the results report are detected again.