General Security Tests

General Security Tests

DDOS Tests

Your organization will perform tests against all types of DDOS attacks that may occur on the internet and are being monitored against the DDOS attacks that may cause your systems to be reported and the status is reported.
To prevent DDOS attacks, open source and commercial products should be used and the necessary infrastructure should be established.
If the openness is analyzed, appropriate products tested by us are recommended and work is started to remove the openness.

Firewall Tests

Firewall products at the premises are tested under Firewall Tests. The biggest hindrances against possible attacks and malware are expected from firewalls. After analyzing the hardware and software being tested, it is determined if there are critical openings in the firewall. It is recommended that products which do not provide full protection be replaced or configured. The detected results are reported.

URL and Content Filtering Tests

By using content filtering, you can be protected from harmful content on your internet network. Scanning rules are checked for scanned websites, and the harmful content of the specified scanning rules is tested to determine when it has been blocked. The results obtained are reported.

DNS Service Test

Dns Service Tests detect possible attacks through DNS such as Dns Hijacking, which allows the name servers on the host to make changes to the defined fields, or Dns Spoofing, which leads to false routing of incorrect IP addresses. The results are reported.

E-mail Service Test

It is the type of test that covers vulnerability scanning in e-mail clients and web e-mail systems. E-mail protocol services can not always provide control and protection for Spam or Spoofing. E-mails coming from inside and outside the institution, e-mail going out of the institution are checked. Situations are reported if there are weaknesses.

Social Engineering Tests

Attackers are attacks on human vulnerabilities to obtain the information they want with various persuasion and deception methods. Lack of awareness of the information security of the personnel in the institution is caused. Attackers often use these methods for phone, e-mail, and so on. as well as communication channels. In order to identify such openings, a simulation is carried out in the institution and the situations are reported.

Wireless Network Tests

Wireless networks; protocols, features, and user unconsciousness. Attackers can listen to traffic due to openness on the network and even use password cracking methods for encryption protocols in the WEP / WPA / WPA2 types. This type of attacking organization is exploring and analyzing wireless networks. These discoveries are carried out with the scanning tools we use and the cases are reported.

Database Configuration Test

The database used to register the properties of the configuration items and the relationships of the configuration elements is scanned. It is determined whether there is an error in the database configuration against the possible attack on the database. Results are reported together with the results.