ACyber Security , Iran Security Company , Services

Services

A cyber offers a wide range of information security professional services, including:

  • arrowNetwork Penetration Testing
  • arrowWeb Application Penetration Testing
  • arrowWeb Services Penetration Testing
  • arrowAndroid Apps Penetration Testing
  • arrowAndroid Apps Source Code Review
  • arrowAndroid Apps Reverse Engineering
  • arrowSoftware Penetration Testing
  • arrowClient-Side Penetration Testing
  • arrowWireless Penetration Testing
  • arrowAppliance Penetration Testing
  • arrowSoftware Security Assessments
  • arrowSource Code Reviews
  • arrowCopy Protection / Licensing scheme
  • arrow

Penetration Testing is a method used to evaluate the security of a network, web application, web service, and any other software system or device by simulating an attack in a controlled manner. The analysis is performed using different attacker profiles with little or no information about the systems under review.

A cyber Penetration Testing Methodology is the result of over 4 years of experience. We focus on manual testing of the systems which allows for the detection of logic flaws and complex vulnerabilities with the help of automated tools to obtain the best results in a time efficient manner.

Our methodology includes the following phases:

  • arrowInformation gathering
  • arrowVulnerability assessment
  • arrowInformation Analysis
  • arrowExploitation
  • arrowContinuous Reporting


Our methodology is aimed at finding known and also previously unknown vulnerabilities using different techniques including reverse engineering, instrumentation, manual fault injection, automated fuzzing and the creation of custom tools / Proof-of-concept code.

The deliverables for a Penetration Test include:

  • arrow Final Report containing an Executive Summary, Conclusions and General Recommendations, and a very detailed technical description of each of the issues found and possible solutions/workarounds (including proof-of-concept code when possible).

Penetration Testing is the best option to evaluate the security of a system using a reduced amount of time.

Source Code Reviews and security assessments in general consist in a more detailed and thorough examination of the security of a system and as a result take longer to perform.

A cyber Source Code Review methodology includes the following tasks:

  • arrow Manual inspection of the code
  • arrow Use of automated tools to identify common implementation errors and 'suspicious' code<
  • arrow Verification of issues found by testing against the application / system when available
  • arrow Review of the application as a whole looking for logic flaws and other vulnerabilities

For more information or if you have special requirements please contact us at contact and Order .