The company sought support in assessing the security of its external information infrastructure and key BPaaS platform.
The client required a detailed audit with a comprehensive analysis, as well as clear, structured recommendations of both technical and strategic nature to improve cybersecurity.Key Challenges
- Identify potential vulnerabilities and possible attack vectors
- Ensure compliance with legal information security requirements
- Strengthen security mechanisms to reduce the risks of data leaks
The project was implemented in two phases, each of which provided a comprehensive security assessment of the customer's infrastructure.
The first phase involved analyzing source code and executable files using SAST and DAST methods. ICL Services specialists tested the system for vulnerabilities in real time, simulating possible external attacks and verifying the effectiveness of previously identified issues.
In the second phase, the team conducted comprehensive penetration testing. They used both black-box methods, where the assessment was conducted without access to internal data, and gray-box methods, where web applications and systems with user access were tested.
Black-box testing consisted of several steps:
- began with reconnaissance and information gathering on target systems, using open sources, DNS, WHOIS, and OSINT tools to understand the network structure and potential entry points,
- next, port scanning was performed using Nmap, searching for hidden files and directories, and extracting information.
Privilege escalation attempts were also performed on accessible internal systems.
The team utilized a wide range of tools, including Burp Suite Professional Edition, SonarQube, OWASP ZAP, Google Dorking, Nmap, Nessus, and kiterunner, allowing them to thoroughly identify and systematize all potential risks.
Products and technologies
- Burp Suite Professional Edition
- SonarQube
- OWASP ZAP
- Google Dorking
- Nmap
- Nessus
- kiterunner
Results
- We identified priority areas for improving the information security management system.
- Identified over 20 vulnerabilities with detailed descriptions, exploitation scenarios, and potential impacts on the customer's infrastructure.
- Prepared recommendations for promptly eliminating vulnerabilities and strengthening the corporate perimeter's security in the short term.
- Developed strategic recommendations for transforming the IT infrastructure to increase its security, and low-level instructions for independently conducting regular scans.