CTD

Certified Cyber Security Services

We work to protect critical business assets

Armed with proficiency in multiple security application tools, network technologies and operating systems, as well as a knack for translating complex security aspects into business terms, we cover a wide range of industries from E-commerce, Medical, Telecommunication, custom software products and many others.

Anti piracy actions

Investigations

In case your software products are pirated we can investigate and can take the right actions to stop piracy and software theft

Training and consultancy

Experience the industry’s most realistic penetration testing security training courses. Taught by the ethical hackers that went through hundreds of pentests.

External Penetration test

Best method to simulate an actual external attack is to execute an External Penetration test. The security team is not provided with any real information about the target environment (other than IP address), and they must covertly collect information before the attack.

External pentest includes everything from web application security, web servers, services, physical security, phishing attacks, Denial of Service and many others.
Our security team will try to find all the ways that will allow an attacker inside the company network.
The vunerabilities discovered are reported back to the client in easy to understand manner.

  • Realistic attack scenarios which portray actual results and methods of an attacker
  • Covering all public areas from the network from services, applications, servers, IPs
  • Clearly explained step-by-step definitions of each and every vulnerability
  • Remediation support

Internal Penetration testing

Internal security assessments are simulating the scenario when the attacker has already infected one of the employees PC or a server.
Internal pentests determine what is the biggest risk in case of an already breached network and how far the attacker can go. In this type of assessment our security team will have access to the company network without any knowledge about network configuration or architecture.

The security team will try to detect all weak points from inside the network and will try to escalate their privilege until they will have complete access.

General Internal network approach:

Web Application Security

The primary objective of a web application penetration test, is to identify exploitable vulnerabilities in applications before hackers are able to discover and exploit them.

Web application penetration testing reveals real-world opportunities for hackers to compromise applications in ways that allow unauthorized access to sensitive data or even system take-overs for malicious purposes.

In our testing we include everything:

Injections: SQL, XSS, CSRF Authentication tests and Session Management Sensitive Data Exposure checks Broken Access Control Security Misconfigurations

Our application pen testers also have experience developing software — not just trying to break it. They leverage this experience to zero in on critical issues and provide actionable remediation guidance.

Mobile Application Security

As application security experts, it is our mission to define and promote mobile application security.
We perform penetration testing and code review on all platforms for mobile applications and has created a dedicated testing environment fully equipped for testing Android and iOS applications.

During testing, we simulate a multitude of attacks, both general application attacks and mobile dedicated attacks.

The testing simulates a real hacker and what he can do to penetrate the application and retrieve confidential or sensitive data.

Based on OWASP Mobile security. When testing the security of mobile applications our security team uses the framework from OWASP mobile project which is one of the most complete and worldwide appreciated by experts.

Part of the security checks are:

M1: Improper Platform Usage M2: Insecure Data Storage M3: Insecure Communication
M4: Insecure Authentication M5: Insufficient Cryptography M6: Insecure Authorization
M7: Client Code Quality M8: Code Tampering M9: Reverse Engineering M10: Extraneous Functionality

Our partner