SlideShare a Scribd company logo
1 of 33
Collaborative Security
Audits
http://www.clarifiednetworks.com/

Email/Jabber/Google Talk: jani@clarifiednetworks.com
Testimonial


"With Clarified Networks we
had true situational
awareness...
...This way we received better
return than ever before ...
...Similar agility is very seldom
achieved even with teams
working in the same room."
• - Jaan Priisalu, Head of IT Risk
  Management / Swedbank Baltic
Two Topics




2
Collaboration

1
Traffic Audits

2
What Is Collab
Why Collaboration
Tasks and Targets

                    Open Source
                   Reconnaissance
                                                       People

Social Engineering




 Laptop Security
     Review                         Corporate
                                     Laptops




Website Security
   Review


                   Robustness Testing   Traffic Audit
Bring In The Teams
And Collaborate
Get Synthesis Of Results
Example
Get Situational Awareness
Example
Get Comprehensive
                                Understanding
                           Trained
                          Caller ID
                         verification




                                                   Access
                                                          l
                                                   Contro
                  Access
                  Control


               s
         tiviru ention
     -An Prev
        on       g
    rusi ewallin
-Int -Fir
                                            n  g
                                     lt eri                                             ns
                                 t Fi                                                ke
                            n ten -exe                                             To
                         Co         -zip                                      eN
                                        -...                        red ls   N
                                                               ecu ina
                                                              S m
                                                                  r
                                                               Te
Why Traffic Audits

2
Networks Used To Be Simple
Then We Evolved
Why Traffic Audits (1/2)
Why Traffic Audits? (2/2)
Why Not Earlier?
c06 / 2005-04-19
                                                                                                                                      Mikko Hiltunen
                                       FRONTIER-COMPAT: IPSec-bridges & Probes                                                        University of Oulu




                                                                                                               Internet


              Tampere                                                                                         13
       8                                                                                                           Logserver
WLAN-probe                                                              Access Network
192.168.0.6
                   3                                      WLAN-probe     WLAN-probe
                       IPSec-
                                                          192.168.0.5    192.168.0.4     Access
                       bridge
                                                         8              8                Controller
                                                                                        5                              Backbone


                                                                                                                   6
                                                                                                                    RADIUS
                                             4
                                            IPSec-                                Probe3 10                         Server
                                            hub                                   192.168.0.3

                                                                                                      7
                                       IPSec-                                                     User
                                       bridge                                                     Database                      Backbone2
                                Oulu    3                                                                    11                14
                                                                                                                               RADIUS- /
                                                                                                             Probe4            SS7-GW
                          Access
                   2      Point                 9    Probe2
                                                     192.168.0.8



                                                                                         12
 1             8   WLAN-probe
     Client                                                        Probenet      Supervisor
                                                                                                                                     Legend:
                   192.168.0.9
                                                                                                                                               ethernet
                                                                                                                                               ipsec-tunnel
                                                                                                                                               probe-net
Data Flows/Demo
What you are able to Find
Leaks From Isolated Nets




                            NTP
                          updates
                         from the
                        competing
          Failing DNS    operator
Windows
Updates     queries
Tunneling Leaks
   Internet

         IP
   Gi
              GGSN
   Gn


              GTP
    “Core”
VoIP issues
Compromised Hosts




RADIUS
         IRC
End-to-End Testing
Malware Analysis
Questions?
Hacknet Special




https://www.clarifiednetworks.com/hacknet/
How We Can Collaborate?


• Tools (now)
 • Clarified Analyzer
 • Codenomicon Defensics
• Whitelabeled SecAudit
 Collabs (~6 months)

More Related Content

Similar to Collaborative Security Audits

iptable casestudy by sans.pdf
iptable casestudy by sans.pdfiptable casestudy by sans.pdf
iptable casestudy by sans.pdfAdmin621695
 
ITSAC 2011 SCAP for Inter-networking Devices
ITSAC 2011 SCAP for Inter-networking DevicesITSAC 2011 SCAP for Inter-networking Devices
ITSAC 2011 SCAP for Inter-networking Devicesc3i
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analyticsconfluent
 
Ogce Workflow Suite Tg09
Ogce Workflow Suite Tg09Ogce Workflow Suite Tg09
Ogce Workflow Suite Tg09smarru
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMOpen Networking Summit
 
資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術bv8af4
 
OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09Catherine Nuel
 
Sp livenyc dow jones_10_21_2010_edit
Sp livenyc dow jones_10_21_2010_editSp livenyc dow jones_10_21_2010_edit
Sp livenyc dow jones_10_21_2010_editBrian Guilfoyle
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
 
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...DataWorks Summit
 
Openflow Stanford University - Ericsson Collaboration
Openflow Stanford University - Ericsson CollaborationOpenflow Stanford University - Ericsson Collaboration
Openflow Stanford University - Ericsson CollaborationEricsson Labs
 
Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5ictseserv
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gvvgy_a
 
Service Density By Xelerated At Linley Seminar
Service Density By Xelerated At Linley SeminarService Density By Xelerated At Linley Seminar
Service Density By Xelerated At Linley SeminarXelerated
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 

Similar to Collaborative Security Audits (20)

iptable casestudy by sans.pdf
iptable casestudy by sans.pdfiptable casestudy by sans.pdf
iptable casestudy by sans.pdf
 
SniffJoke 0.4
SniffJoke 0.4SniffJoke 0.4
SniffJoke 0.4
 
ITSAC 2011 SCAP for Inter-networking Devices
ITSAC 2011 SCAP for Inter-networking DevicesITSAC 2011 SCAP for Inter-networking Devices
ITSAC 2011 SCAP for Inter-networking Devices
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
 
Ogce Workflow Suite Tg09
Ogce Workflow Suite Tg09Ogce Workflow Suite Tg09
Ogce Workflow Suite Tg09
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAM
 
DAC 2012
DAC 2012DAC 2012
DAC 2012
 
資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術
 
OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09
 
Sp livenyc dow jones_10_21_2010_edit
Sp livenyc dow jones_10_21_2010_editSp livenyc dow jones_10_21_2010_edit
Sp livenyc dow jones_10_21_2010_edit
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...
 
Openflow Stanford University - Ericsson Collaboration
Openflow Stanford University - Ericsson CollaborationOpenflow Stanford University - Ericsson Collaboration
Openflow Stanford University - Ericsson Collaboration
 
Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5Fia aalborg-statement-iopapafi-v0.5
Fia aalborg-statement-iopapafi-v0.5
 
Rajesh - CV
Rajesh - CVRajesh - CV
Rajesh - CV
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 
Service Density By Xelerated At Linley Seminar
Service Density By Xelerated At Linley SeminarService Density By Xelerated At Linley Seminar
Service Density By Xelerated At Linley Seminar
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Collaborative Security Audits

Editor's Notes

  1. Validation of Collaborative Approach Customer is able to steer & participate in a lightweight manner -> higher customer satisfaction You are able to dynamically utilize several teams Your Seniors can participate in several engagements as a part of the virtual team You are able to leverage information instantly For example Social Engineers may utilize information gained from Web Application Testing in their Phishing
  2. Two topics today: Collaboration (Process) Traffic Audits (Technical, practical example on how tools and people collaborate)
  3. Infrastructure, tools and services for you to get more out from your security audits
  4. Based on real observations from your customer’s network you will help them with Network related fact finding, network discovery and documentation and identifying weak spots Traffic audit will help you to pinpoint: Access control leaks, misconfigured hosts and real traffic profiles.
  5. Tools will contribute: Tight integration: Clarified Analyzer Loose integration: Defensics, Nessus, Nmap, People: Your specialists, customer, customer’s contractors Infrastructure: A wiki-based environment, supporting XMLRPC interface for tool integration, graphingwiki for easy handling and visualization of semantic data
  6. Complex Networks -> we need to understand them to give more valuable/accurate results A myriad of different audit methods: we need to synthesize the results
  7. With Collab we are able to utilize larger teams with domain specific specialists.
  8. Different specialists may collaborate: For example web application testers find XSS vulnerabilities -> Social Engineers will utilize
  9. - We do not merely upload documents (e.g. Like in sharepoint...) - We chop the information to pieces and synthesize it in the Collab environment Analysts and customer sees the results from their viewpoint, not from the analysts viewpoint ‘Web Servers Applications were secured, however the web server runs a vulnerable FTP server, which is accessible from the proxy found in Traffic Audit’
  10. This example shows how NMap results and Clarified Analyzer Traffic Audit results can be shown in the context of IP-addresses. Above is a list of devices and their addresses documented with Clarified Analyzer
  11. Customer and your seniors can monitor the progress of the service deployment in ‘real-time’. RecentChanges RSS feeds Situational visualizations (GraphingWiki)
  12. Analyst A does Open Source Reconnaissance (Intelligence) and uploads the information to the right Collab instance. Phisers will utilize this information and tag the status as they go. Senior Analyst sees how testing progresses. Customer is able to comment: ‘These addresses are admins, they should not be phished as that will blow our cover.’
  13. Benefit: You’re understanding of Customer’s social/technical setting will grow significantly during the deployment: You are able to give more valuable results as you put them to the right context You are able to adjust your plans on the fly as you see the customer’s strong and weak spots
  14. - Increase system performance by removing needless traffic - Eliminate potential vulnerabilities by removing unnecessary protocols - Discover violations in Access Control - Document, or eliminate ad hoc workarounds that bypass security policies - Find hosts and protocols which do not conform to organisation policy
  15. It used to be simple: just servers and clients and simple protocol in between.
  16. Then we evolved: messages are passed within a complex system, using several different types of protocols. It is hard to: Discover weak spots (‘You have build a lots of security features but did you know that the user input travels all the way to the core of your network. These inputs may exploit the vulnerabilities inside your net’.) When something really goes wrong, the path from symptoms to root cause is long.
  17. A more practical example. The network in the bottom of the picture is considered totally isolated. In reality there is a number of traffic flows traveling in and out. (This example contains only few use cases: user joins to the network and updates his presence).
  18. Still, our assumption is this: only one well guarded route in. (Dragons and soldiers are watching.)
  19. Understanding complexity based on actual (and detailed) traffic has been hard.
  20. Thanks to the tools we’ve build it is now considerable simpler.
  21. Analyzer setup: Recorders collect traffic and do real-time indexing (flows vs packets) You may run the recorders on standard PC hardware with Linux-based OS (Centos distro recommended) Analyzer will give you easy access to the collected information Analyzer will transparently upload/download notes from Collab environment
  22. Tunneling leaks.
  23. Trivial vulnerabilities that were not discovered earlier due to complexity of the system under testing. The following picture is from hugely complex VoIP setup, which included a number of security features (VPNs, ACLs, etc) As we gained understanding of the target, we discoverd that forging the caller ID is simple, even when you are using standard mobile phones. As a side note: mobile phones happily showed the name even they were not in the address book. (Tarja Halonen is the president of Finland)
  24. Compromised servers.
  25. End-to-End testing. -This example runs Codenomicon Robustness Testing tools to test if SIP proxy can be bypassed with fuzzed packets
  26. Detailed but understandable analysis for found issues. Here we use Clarified Analyzer’s Next Gen topology view for documenting a malware ‘topology’. Once you have the documentation, you have easy access for flows and packets from certain time and certain host(s)
  27. Easy start: simple tool sales When you have gained experience using some of our tools, we can take the next step and deploy Infrastructure, Tools and Services for collaborative security audits.