SlideShare a Scribd company logo
Portfolio and Services Overview
Tel: +27(12) 743 6123
Cell: +27 79 191 2362
Email: rhys@networksecurityservices.net
Website: www.networksecurityservices.net
Rhys A. Mossom Network Security Services – Service Portfolio Page 1 of 6
1
Rhys A. Mossom – Services Portfolio
Network Security Services Portfolio
With experience consulting for a number of large institutions including Banks, Governmental departments,
multimedia services and online e-stores, I can provide comprehensive holistic services including but not limited
to:
• Internal and External Penetration Tests
• Web Application Security Assessments
• Vulnerability Assessments
• Source-code Reviews
• Information-Security Training
• Social Engineering and Internal Security Assessments.
• Research and Development
• Information on Delivery of Reports
These tests and services are designed to address various needs likely to arise in any organisation utilising
internal and external networks, allowing a bespoke package solution to address specific needs.
Rhys A. Mossom Network Security Services – Service Portfolio Page 2 of 6
2
Rhys A. Mossom – Services Portfolio
Services Overview:
Internal and External Penetration Tests
The objective of this type of assessment is to identify issues and report on vulnerabilities on a wide level to
allow the client to resolve or mitigate the issues. In a penetration test, vulnerabilities are actively exploited to
gauge the extent of vulnerability impact on infrastructure and business operations.
In this test the client is provided with a comprehensive report detailing vulnerabilities found, how the
vulnerability was exploited, suggested-resolutions and evidence of vulnerability-discovery.
A Penetration Test is completed in one of the three following ways, each with their own advantages:
White Box
In this method of testing the security of system or subnet, is done with full prior knowledge of the device or
network. This is usually done to simulate an attack from an internal, administrative level attack.
Grey Box
In this method of testing the security of system or subnet, is done with limited prior knowledge of the device or
network. This is usually done to simulate an attack from an internal, but non-administrative level attack.
Black Box
In this method of testing the security of system or subnet, is done without any prior knowledge of the device or
network. This is usually done to simulate an attack from an outside intruder.
Back to top
Web Application Security Assessments
In this type of Penetration Test, Web application assessments are performed to identify potential or realized
vulnerabilities in a client’s Web application.
Web Application Assessments security assessments follow a similar testing methodology to Network
Penetration Tests. Vulnerabilities are discovered hands-on through the use of manual testing. Finally if
vulnerabilities are found they are exploited to discover the extent of risk. Mitigation of these issues will
minimize the attack surface available.
Web Applications are a major source of data disclosure due to their wide use on the internet and as such,
databases (such as MYSQL or MSSQL) are often used to store confidential information and are therefore
frequent targets for attackers. Many businesses rely upon Web Applications to store critical data including
confidential customer information such as credit card numbers and ID numbers.
Rhys A. Mossom Network Security Services – Service Portfolio Page 3 of 6
3
Rhys A. Mossom – Services Portfolio
In this test the client is provided with a comprehensive report detailing vulnerabilities found, suggested-
resolutions and evidence of vulnerability-discovery.
Attack Methods:
 Buffer Overflows
 Clickjacking
 Cross Site Request Forgery (CSRF)
 Cookie Theft/Session Hijacking
 Cross Site Scripting (XSS)
 LDAP Injection
 SQL Injection
 XML Injection
 Remote code execution techniques
 Logic Flaw Exploitation
 Remote/Local file inclusion (RFI/LFI)
 username and password weaknesses
 Denial of Service (DoS)
 And more according to various standards.
Back to top
Vulnerability Assessments
A vulnerability assessment is performed to identify and report on security issues contained in networks,
websites, applications, or software that could potentially be subject to future exploitation.
A Vulnerability Assessment is a pre-emptive measure allowing clients to close issues on pre-production
software and systems. No vulnerability-exploitation takes place in this assessment.
With this test the client is provided with a comprehensive report detailing possible future vulnerabilities found
and suggested-resolutions.
Back to top
Rhys A. Mossom Network Security Services – Service Portfolio Page 4 of 6
4
Rhys A. Mossom – Services Portfolio
Source-code Reviews
In this test, source-code is reviewed to ensure it follows recognized safety measures. This is a pre-emptive
option allowing software to be rigorously reviewed pre-production helping ensure deployed source-code is
deemed safe and secure from bugs and vulnerabilities. Source code reviews can be performed in a number of
different languages to meet the client’s demands.
In this test the client is provided with a comprehensive report detailing possible future vulnerabilities found and
suggested source code alterations.
Back to top
Security Training
Courses can be provided which cover the following topics:
 Bluetooth & Wireless Hacking
 Web Application Hacking
 Social Engineering
Courses are presented hands-on, with equipment provided to demonstrate the fundamental aspects of
information security and security assessments. Additionally reference training material will be provided.
Back to top
Social Engineering and Internal Security Assessments
In this option both physical security vulnerability issues and security policy are highlighted and reported upon.
Social engineering is a non-technical form of hacking where sensitive information is gathered through the
exploitation of people through either computer based or non-computer based manipulation.
This can include:
• Blind assessments of security personal
• Assessment of general security-awareness
• Assessment of physical security methods such as RFID/Magstripe/etc.
• And more.
Back to top
Rhys A. Mossom Network Security Services – Service Portfolio Page 5 of 6
5
Rhys A. Mossom – Services Portfolio
Research and Development
In an industry that is so dynamic, companies must continually revise their methodologies, tools, ideas and
products. This is necessary due to technology advancement and development. R.A.M Network Security
Services Labs functions as an R&D group to discover and create new knowledge about cyber-security related
topics for the purpose of enabling development of valuable new products, ideas, methodologies, services, and
new information security tools.
R.A.M Network Security Services Labs conducts research on two frontiers: Hardware and Software.
Software:
 Cyber threats and countermeasures
 Reverse engineering
 Vulnerability identification
 Malware analysis
 0day (Zero Day) discovery
 Development of new security tools
 Proof of Concept (PoC) exploits and vulnerabilities
 R.A.M Network Security Services acts as an vulnerability advisor
Hardware:
Misc. Hardware:
 Wireless systems and reverse engineering
 Hardware data protocol reverse engineering
Authentication Systems:
 Smart ID systems
 Smart card security research
 Secure smart card applications
 RFID Systems
 Fingerprint recognition systems
 Iris recognition
 Facial recognition systems
Back to top
Rhys A. Mossom Network Security Services – Service Portfolio Page 6 of 6
6
Rhys A. Mossom – Services Portfolio
Information on Delivery of Reports
Reports are written using the following general methodology:
 An Executive Summary detailing the overall findings and possible impact
 Grading of Vulnerabilities
 Technical summary that details the following:
o If vulnerability is detected, what was detected and what would be the impact if this issue was left
unmitigated.
o If vulnerability is detected, how was it detected, with what actions, methods or tools were used
during the assessment.
o If vulnerability is detected, and was successfully exploited during the course of analysis, it would
be explained how this was done and what could be achieved during exploitation.
o Detailed suggested remediation is provided to correct the vulnerability. If this is applicable,
hyperlinks are provided leading to related suggested reading material.
 A presentation of the report and findings can be performed. This is done to help the client understand
the report and for the client to ask any questions that might require answering regarding the report or
assessment.
Back to top
Rhys A. Mossom Network Security Services Pty (Ltd)
Email: rhys@networksecurityservices.net
Website: http://www.networksecurityservices.net
Telephone: +27 (0) 12 743 6123
Telephone: +27 (0) 79 191 2362
Back to top

More Related Content

What's hot

Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
Raghav Bisht
 
Supply chain-attack
Supply chain-attackSupply chain-attack
Supply chain-attack
vikram vashisth
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
Mohit Belwal
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
21CT Inc.
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
Infosec
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
North Texas Chapter of the ISSA
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
Nasir Bhutta
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
btpsec
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
Kellep Charles
 
PACE-IT: Network Access Control
PACE-IT: Network Access ControlPACE-IT: Network Access Control
PACE-IT: Network Access Control
Pace IT at Edmonds Community College
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
rajkumar jonuboyena
 
Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easy
EC-Council
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
Apurv Singh Gautam
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
Infosec
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
Pace IT at Edmonds Community College
 

What's hot (20)

Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Supply chain-attack
Supply chain-attackSupply chain-attack
Supply chain-attack
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 
PACE-IT: Network Access Control
PACE-IT: Network Access ControlPACE-IT: Network Access Control
PACE-IT: Network Access Control
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easy
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 

Similar to RAMNSS_2016_service_porfolio

Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
martinvoelk
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
ElanusTechnologies
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
amaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
amaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
amaranthbeg73
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
Pace IT at Edmonds Community College
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
Nutan Kumar Panda
 
Importance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.ioImportance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.io
SOCVault
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docx
Afour tech
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
Sprintzeal
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
JeganathanJayaran
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
EnterpriseGRC Solutions, Inc.
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
AmeliaJonas2
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 

Similar to RAMNSS_2016_service_porfolio (20)

Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Importance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.ioImportance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.io
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docx
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 

RAMNSS_2016_service_porfolio

  • 1. Portfolio and Services Overview Tel: +27(12) 743 6123 Cell: +27 79 191 2362 Email: rhys@networksecurityservices.net Website: www.networksecurityservices.net
  • 2. Rhys A. Mossom Network Security Services – Service Portfolio Page 1 of 6 1 Rhys A. Mossom – Services Portfolio Network Security Services Portfolio With experience consulting for a number of large institutions including Banks, Governmental departments, multimedia services and online e-stores, I can provide comprehensive holistic services including but not limited to: • Internal and External Penetration Tests • Web Application Security Assessments • Vulnerability Assessments • Source-code Reviews • Information-Security Training • Social Engineering and Internal Security Assessments. • Research and Development • Information on Delivery of Reports These tests and services are designed to address various needs likely to arise in any organisation utilising internal and external networks, allowing a bespoke package solution to address specific needs.
  • 3. Rhys A. Mossom Network Security Services – Service Portfolio Page 2 of 6 2 Rhys A. Mossom – Services Portfolio Services Overview: Internal and External Penetration Tests The objective of this type of assessment is to identify issues and report on vulnerabilities on a wide level to allow the client to resolve or mitigate the issues. In a penetration test, vulnerabilities are actively exploited to gauge the extent of vulnerability impact on infrastructure and business operations. In this test the client is provided with a comprehensive report detailing vulnerabilities found, how the vulnerability was exploited, suggested-resolutions and evidence of vulnerability-discovery. A Penetration Test is completed in one of the three following ways, each with their own advantages: White Box In this method of testing the security of system or subnet, is done with full prior knowledge of the device or network. This is usually done to simulate an attack from an internal, administrative level attack. Grey Box In this method of testing the security of system or subnet, is done with limited prior knowledge of the device or network. This is usually done to simulate an attack from an internal, but non-administrative level attack. Black Box In this method of testing the security of system or subnet, is done without any prior knowledge of the device or network. This is usually done to simulate an attack from an outside intruder. Back to top Web Application Security Assessments In this type of Penetration Test, Web application assessments are performed to identify potential or realized vulnerabilities in a client’s Web application. Web Application Assessments security assessments follow a similar testing methodology to Network Penetration Tests. Vulnerabilities are discovered hands-on through the use of manual testing. Finally if vulnerabilities are found they are exploited to discover the extent of risk. Mitigation of these issues will minimize the attack surface available. Web Applications are a major source of data disclosure due to their wide use on the internet and as such, databases (such as MYSQL or MSSQL) are often used to store confidential information and are therefore frequent targets for attackers. Many businesses rely upon Web Applications to store critical data including confidential customer information such as credit card numbers and ID numbers.
  • 4. Rhys A. Mossom Network Security Services – Service Portfolio Page 3 of 6 3 Rhys A. Mossom – Services Portfolio In this test the client is provided with a comprehensive report detailing vulnerabilities found, suggested- resolutions and evidence of vulnerability-discovery. Attack Methods:  Buffer Overflows  Clickjacking  Cross Site Request Forgery (CSRF)  Cookie Theft/Session Hijacking  Cross Site Scripting (XSS)  LDAP Injection  SQL Injection  XML Injection  Remote code execution techniques  Logic Flaw Exploitation  Remote/Local file inclusion (RFI/LFI)  username and password weaknesses  Denial of Service (DoS)  And more according to various standards. Back to top Vulnerability Assessments A vulnerability assessment is performed to identify and report on security issues contained in networks, websites, applications, or software that could potentially be subject to future exploitation. A Vulnerability Assessment is a pre-emptive measure allowing clients to close issues on pre-production software and systems. No vulnerability-exploitation takes place in this assessment. With this test the client is provided with a comprehensive report detailing possible future vulnerabilities found and suggested-resolutions. Back to top
  • 5. Rhys A. Mossom Network Security Services – Service Portfolio Page 4 of 6 4 Rhys A. Mossom – Services Portfolio Source-code Reviews In this test, source-code is reviewed to ensure it follows recognized safety measures. This is a pre-emptive option allowing software to be rigorously reviewed pre-production helping ensure deployed source-code is deemed safe and secure from bugs and vulnerabilities. Source code reviews can be performed in a number of different languages to meet the client’s demands. In this test the client is provided with a comprehensive report detailing possible future vulnerabilities found and suggested source code alterations. Back to top Security Training Courses can be provided which cover the following topics:  Bluetooth & Wireless Hacking  Web Application Hacking  Social Engineering Courses are presented hands-on, with equipment provided to demonstrate the fundamental aspects of information security and security assessments. Additionally reference training material will be provided. Back to top Social Engineering and Internal Security Assessments In this option both physical security vulnerability issues and security policy are highlighted and reported upon. Social engineering is a non-technical form of hacking where sensitive information is gathered through the exploitation of people through either computer based or non-computer based manipulation. This can include: • Blind assessments of security personal • Assessment of general security-awareness • Assessment of physical security methods such as RFID/Magstripe/etc. • And more. Back to top
  • 6. Rhys A. Mossom Network Security Services – Service Portfolio Page 5 of 6 5 Rhys A. Mossom – Services Portfolio Research and Development In an industry that is so dynamic, companies must continually revise their methodologies, tools, ideas and products. This is necessary due to technology advancement and development. R.A.M Network Security Services Labs functions as an R&D group to discover and create new knowledge about cyber-security related topics for the purpose of enabling development of valuable new products, ideas, methodologies, services, and new information security tools. R.A.M Network Security Services Labs conducts research on two frontiers: Hardware and Software. Software:  Cyber threats and countermeasures  Reverse engineering  Vulnerability identification  Malware analysis  0day (Zero Day) discovery  Development of new security tools  Proof of Concept (PoC) exploits and vulnerabilities  R.A.M Network Security Services acts as an vulnerability advisor Hardware: Misc. Hardware:  Wireless systems and reverse engineering  Hardware data protocol reverse engineering Authentication Systems:  Smart ID systems  Smart card security research  Secure smart card applications  RFID Systems  Fingerprint recognition systems  Iris recognition  Facial recognition systems Back to top
  • 7. Rhys A. Mossom Network Security Services – Service Portfolio Page 6 of 6 6 Rhys A. Mossom – Services Portfolio Information on Delivery of Reports Reports are written using the following general methodology:  An Executive Summary detailing the overall findings and possible impact  Grading of Vulnerabilities  Technical summary that details the following: o If vulnerability is detected, what was detected and what would be the impact if this issue was left unmitigated. o If vulnerability is detected, how was it detected, with what actions, methods or tools were used during the assessment. o If vulnerability is detected, and was successfully exploited during the course of analysis, it would be explained how this was done and what could be achieved during exploitation. o Detailed suggested remediation is provided to correct the vulnerability. If this is applicable, hyperlinks are provided leading to related suggested reading material.  A presentation of the report and findings can be performed. This is done to help the client understand the report and for the client to ask any questions that might require answering regarding the report or assessment. Back to top Rhys A. Mossom Network Security Services Pty (Ltd) Email: rhys@networksecurityservices.net Website: http://www.networksecurityservices.net Telephone: +27 (0) 12 743 6123 Telephone: +27 (0) 79 191 2362 Back to top