Security assessment and penetration test
activities
Discovering vulnerabilities and ways of penetration through internal and external networks
Investigating and analyzing ways to deal with denial of service attacks
Analyzing and identifying attacks, malicious codes and internet worms
Security evaluation of application programs and simulation of penetration ways
Investigating the possibility of intrusion into network and security equipment
Examining the ways of penetration into wireless communications
Investigating the possibility of raising access levels
Social engineering
Detection of back doors
Penetration test of security equipment
Detection of financial frauds
Investigating and analyzing ways to deal with attacks
In case of vulnerability, high-level solutions will be provided in order to reach the desired situation. If there is an exploit code, the company's experts, in addition to writing the exploit code, attach the code and explain how to deal with it in order to provide security solutions.
In the case of systems whose production cycle has ended, a large part of the solutions provided in order to secure the life cycle of that software are practically out of reach. Therefore, another group of solutions, to deal with vulnerability, regardless of the production cycle of a program It is practical. Among these solutions, it is possible to mention the security of systems by security equipment such as web application firewalls, intrusion detection systems, intrusion prevention systems, integrated threat management systems, and the use of security operation center units to monitor and deal with attacks caused by vulnerabilities. . Therefore, Gostar Sharif Security Company is able to provide advice in all the above fields.