SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Deltecs’ Services for Information Security




              like
        Think like a Thief to catch a Thief




                                      |
          Deltecs Infotech Pvt. Ltd
Ph: 022-28488746 | 022-28481451
           Web: www.deltecs.com
          Email: info@deltecs.com
INTRODUCTION


Deltecs Infotech Pvt. Ltd, a leader in information security and penetration testing adopts
the tests listed in the OWASP Top Ten list, as well as the class of tests provided at
OWASC.
Deltecs’ Web Application Security process is a combination of comprehensive
vulnerability detection tests. It is run on the company’s web assets, like web servers, e-
mail servers, data centers, and third party applications running on servers.

With an exhaustive database of existing vulnerabilities Deltecs has an expertise in
vulnerability detection and remediation. The daily update of the database assures the
highest level of remote vulnerability detection available. Combined with an automated
process being managed by world class security experts, this provides an unparalleled
level of network perimeter security.

                                    Authentication


          Brute Force:
          A Brute Force attack is an automated process of trial and error
          used to guess a person’s username, password, credit card number
          or cryptographic key.

          Insufficient Authentication:
          Insufficient Authentication occurs when a website permits an
          attacker to access sensitive content or functionality without
          properly authenticate.

          Weak Password Recovery:
          Weak Password Recovery Validation is when a Website permits an
          attacker to illegally obtain, Change or Recover another user’s
          Password.


                                    Authorization


          Credentials/Session Prediction
          Credentials/Session Prediction is     a   method   of   hijacking   or
          impersonating a website user.

          Insufficient Authorization
          Insufficient Authorization is when a website permits access to
          sensitive content or functionality that requires increased access
          control restriction.

          Insufficient Session Expiration
          Insufficient Session Expiration is when a website permits an
          attacker to reuse old session credentials or session IDs for
          authorization.

          Session Fixation
          Session Fixation is an attack technique that forces a user’s session
          ID to an explicit value.
Client Side Attacks
Cross-site Scripting
Cross-site Scripting (XSS) is an attack technique that forces a
website echo attacker-supplied executable code, which loads in a
user’s browser.



                       Command Execution


SQL Injection
SQL Injection is an attack technique used to exploit websites that
construct SQL statements from a user-supplied input.


                   Information Disclosure

Directory Indexing
Automatic directory listing /indexing is a web server function that
lists all of the files within a requested directory if the normal base
file is not present.

Information Leakage
Information Leakage is when a website reveals sensitive data, such
as developer comments or error messages, which may aid an
attacker in exploiting the system.

Path Traversal
The Path Traversal attack technique forces access to files,
directories, and commands that potentially reside outside the web
document root directory.

Predictable Resource Location
Predictable Resource Location is an attack technique used to
uncover hidden website content and functionality.

                          Logical Attacks


Abuse of Functionality is an attack technique that uses a website‘s
own features and functionality to consume, defraud, or
circumvents access controls mechanisms.

Insufficient Anti-automation
Insufficient Anti-automation is when website permits an attacker to
automate a process that should only be performed manually.

Insufficient Process Validation
Insufficient Process Validation is when a website permits an
attacker to bypass or circumvent the intended flow control of an
application.

Weitere ähnliche Inhalte

Was ist angesagt?

Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
webhostingguy
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
Confiz
 
Possible security issues with data
Possible security issues with dataPossible security issues with data
Possible security issues with data
Colonel_Black
 

Was ist angesagt? (20)

Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 
Secure Code Warrior - Secure by default
Secure Code Warrior - Secure by defaultSecure Code Warrior - Secure by default
Secure Code Warrior - Secure by default
 
Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Secure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior - Least privilege
Secure Code Warrior - Least privilege
 
Secure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior - Fail securely
Secure Code Warrior - Fail securely
 
Step by step guide for web application security testing
Step by step guide for web application security testingStep by step guide for web application security testing
Step by step guide for web application security testing
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 
Secure Code Warrior - Issues with origins
Secure Code Warrior - Issues with originsSecure Code Warrior - Issues with origins
Secure Code Warrior - Issues with origins
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Security 101
Security 101Security 101
Security 101
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
 
Web Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and AuthorizationWeb Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and Authorization
 
Possible security issues with data
Possible security issues with dataPossible security issues with data
Possible security issues with data
 
OWASP
OWASPOWASP
OWASP
 

Andere mochten auch

Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Operator Warnet Vast Raha
 
Appreciation - Head of Sales, APAC at Hilton Worldwide
Appreciation - Head of Sales, APAC at Hilton WorldwideAppreciation - Head of Sales, APAC at Hilton Worldwide
Appreciation - Head of Sales, APAC at Hilton Worldwide
Projjwal Ghosh
 
Игровые автоматы. Наличие
Игровые автоматы. НаличиеИгровые автоматы. Наличие
Игровые автоматы. Наличие
avbazarov
 
Tienda SANTARÂ
Tienda SANTARÂTienda SANTARÂ
Tienda SANTARÂ
SANTARÂ
 
HadoopFundamentals
HadoopFundamentalsHadoopFundamentals
HadoopFundamentals
Calvin Tong
 
Electronic portfolio
Electronic portfolioElectronic portfolio
Electronic portfolio
gracie
 
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3NDNetwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
3ND B.V.
 
PFRH 3G-09-10 Relaciones Interpersonales
PFRH 3G-09-10 Relaciones InterpersonalesPFRH 3G-09-10 Relaciones Interpersonales
PFRH 3G-09-10 Relaciones Interpersonales
NELLYKATTY
 
PFRH DEPORTISTAS -Relaciones Interpersonales
PFRH DEPORTISTAS -Relaciones InterpersonalesPFRH DEPORTISTAS -Relaciones Interpersonales
PFRH DEPORTISTAS -Relaciones Interpersonales
NELLYKATTY
 

Andere mochten auch (19)

Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
 
Sample
SampleSample
Sample
 
A
AA
A
 
Appreciation - Head of Sales, APAC at Hilton Worldwide
Appreciation - Head of Sales, APAC at Hilton WorldwideAppreciation - Head of Sales, APAC at Hilton Worldwide
Appreciation - Head of Sales, APAC at Hilton Worldwide
 
Residential Properties in Gurgaon
Residential Properties in GurgaonResidential Properties in Gurgaon
Residential Properties in Gurgaon
 
Игровые автоматы. Наличие
Игровые автоматы. НаличиеИгровые автоматы. Наличие
Игровые автоматы. Наличие
 
Ms yatie
Ms yatieMs yatie
Ms yatie
 
Tienda SANTARÂ
Tienda SANTARÂTienda SANTARÂ
Tienda SANTARÂ
 
HadoopFundamentals
HadoopFundamentalsHadoopFundamentals
HadoopFundamentals
 
Electronic portfolio
Electronic portfolioElectronic portfolio
Electronic portfolio
 
Label tarikh
Label tarikhLabel tarikh
Label tarikh
 
Lenard duvantiquementefactosobrerazonamiento
Lenard duvantiquementefactosobrerazonamientoLenard duvantiquementefactosobrerazonamiento
Lenard duvantiquementefactosobrerazonamiento
 
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3NDNetwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
 
PFRH 3G-09-10 Relaciones Interpersonales
PFRH 3G-09-10 Relaciones InterpersonalesPFRH 3G-09-10 Relaciones Interpersonales
PFRH 3G-09-10 Relaciones Interpersonales
 
PFRH DEPORTISTAS -Relaciones Interpersonales
PFRH DEPORTISTAS -Relaciones InterpersonalesPFRH DEPORTISTAS -Relaciones Interpersonales
PFRH DEPORTISTAS -Relaciones Interpersonales
 
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositions
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositionsFacto Congres 2016 - eerlijk over morgen het belang van joint value propositions
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositions
 
5- 4 congressional committees
5- 4 congressional committees5- 4 congressional committees
5- 4 congressional committees
 
Recycled Glass
Recycled GlassRecycled Glass
Recycled Glass
 
Types of chromatographic methods
Types of chromatographic methodsTypes of chromatographic methods
Types of chromatographic methods
 

Ähnlich wie Deltecs Services for Vulnerability Assessment and penetration testing

Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
Richard Sullivan
 

Ähnlich wie Deltecs Services for Vulnerability Assessment and penetration testing (20)

Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
 
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptx
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptxWebsite-Security-Protecting-Your-Digital-Assets-in-Development 23.pptx
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptx
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
 
Securing the Web @RivieraDev2016
Securing the Web @RivieraDev2016Securing the Web @RivieraDev2016
Securing the Web @RivieraDev2016
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Web Application Security Tips
Web Application Security TipsWeb Application Security Tips
Web Application Security Tips
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfSecure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdf
 
Lets Make our Web Applications Secure
Lets Make our Web Applications SecureLets Make our Web Applications Secure
Lets Make our Web Applications Secure
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
 
gpt.AI.docx
gpt.AI.docxgpt.AI.docx
gpt.AI.docx
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
Overview of RateSetter web security
Overview of RateSetter web security Overview of RateSetter web security
Overview of RateSetter web security
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Deltecs Services for Vulnerability Assessment and penetration testing

  • 1. Deltecs’ Services for Information Security like Think like a Thief to catch a Thief | Deltecs Infotech Pvt. Ltd Ph: 022-28488746 | 022-28481451 Web: www.deltecs.com Email: info@deltecs.com
  • 2. INTRODUCTION Deltecs Infotech Pvt. Ltd, a leader in information security and penetration testing adopts the tests listed in the OWASP Top Ten list, as well as the class of tests provided at OWASC. Deltecs’ Web Application Security process is a combination of comprehensive vulnerability detection tests. It is run on the company’s web assets, like web servers, e- mail servers, data centers, and third party applications running on servers. With an exhaustive database of existing vulnerabilities Deltecs has an expertise in vulnerability detection and remediation. The daily update of the database assures the highest level of remote vulnerability detection available. Combined with an automated process being managed by world class security experts, this provides an unparalleled level of network perimeter security. Authentication Brute Force: A Brute Force attack is an automated process of trial and error used to guess a person’s username, password, credit card number or cryptographic key. Insufficient Authentication: Insufficient Authentication occurs when a website permits an attacker to access sensitive content or functionality without properly authenticate. Weak Password Recovery: Weak Password Recovery Validation is when a Website permits an attacker to illegally obtain, Change or Recover another user’s Password. Authorization Credentials/Session Prediction Credentials/Session Prediction is a method of hijacking or impersonating a website user. Insufficient Authorization Insufficient Authorization is when a website permits access to sensitive content or functionality that requires increased access control restriction. Insufficient Session Expiration Insufficient Session Expiration is when a website permits an attacker to reuse old session credentials or session IDs for authorization. Session Fixation Session Fixation is an attack technique that forces a user’s session ID to an explicit value.
  • 3. Client Side Attacks Cross-site Scripting Cross-site Scripting (XSS) is an attack technique that forces a website echo attacker-supplied executable code, which loads in a user’s browser. Command Execution SQL Injection SQL Injection is an attack technique used to exploit websites that construct SQL statements from a user-supplied input. Information Disclosure Directory Indexing Automatic directory listing /indexing is a web server function that lists all of the files within a requested directory if the normal base file is not present. Information Leakage Information Leakage is when a website reveals sensitive data, such as developer comments or error messages, which may aid an attacker in exploiting the system. Path Traversal The Path Traversal attack technique forces access to files, directories, and commands that potentially reside outside the web document root directory. Predictable Resource Location Predictable Resource Location is an attack technique used to uncover hidden website content and functionality. Logical Attacks Abuse of Functionality is an attack technique that uses a website‘s own features and functionality to consume, defraud, or circumvents access controls mechanisms. Insufficient Anti-automation Insufficient Anti-automation is when website permits an attacker to automate a process that should only be performed manually. Insufficient Process Validation Insufficient Process Validation is when a website permits an attacker to bypass or circumvent the intended flow control of an application.