Don’t just assume your IT environment is safe—see it for yourself
Penetration testing is an effective way to find and fix vulnerabilities in your cybersecurity defence. By simulating an attack, you can see exactly how your IT environment and your team would hold up in a real attack.
If there’s a way into your network, we’ll find it
Testing scenarios include red team and purple team exercises to test:
- Web applications
- Application programming interfaces (APIs)
- Internal and external infrastructure
- Mobile apps
- Internet of things (IoT) devices
Our pentesting services
Our testing methodology—using black box and grey box testing—is based on the Penetration Testing Execution Standard (PTES)—a set of guidelines and best practices designed to govern the process of conducting a penetration test. It outlines the key stages and methodologies that should be followed to ensure a consistent, high-quality and ethical approach to pentesting.
- Broken access control
- Cryptographic failures
- Injection
- Insecure design
- Security misconfiguration
- Vulnerable and outdated components
- Identification and authentication failures
- Software and data integrity failures
- Security logging and monitoring failures
- Server-side request forgery (SSRF)
- Broken object level authorization
- Broken authentication
- Broken object property level authorization
- Unrestricted resource consumption
- Broken function level authorization
- Unrestricted access to sensitive business flows
- Server-side request forgery
- Security misconfiguration
- Improper inventory management
- Unsafe consumption of APIs
Assessments and pentesting focus on the following elements:
- Vulnerability scanning to understand the exposed services and tools, such as Nessus, Nexpose and NMAP
- Internet footprinting using techniques such as WHOIS, ARIN, Traceroute, NSLookup
- Identification of exposed ports and vulnerable services which can be exploited
- Determination of default and guest passwords or where weak password controls are followed
- Discovery of host misconfiguration and file system exposure
- Vulnerability scanning to understand the exposed services, tools such as Nessus, Nexpose and NMAP
- Discovery of hosts which are part of the subnet but not identified by the client
- Identification of ports and vulnerable services which can be exploited on the network
- Determination of the patch level of each host and network device to gain an understanding of which ones are exploitable
- Determination of default and guest passwords or where weak password controls are followed
- Discovery of host misconfiguration and file system exposure
- Uncovering of user and group permission misconfiguration
- Elevation of privileges to gain high-privilege access to endpoints, either external or internal
- End-to-end encryption of data-in-transit that cannot be disabled by an end user
- Sandboxing to separate and restrict the capabilities and permissions of workspace apps that run on the device
- Policy controls for authentication, secure boot, application whitelisting, malicious code detection and prevention, device update and security event collection
- Network security configuration review to understand if services are protected
- Protection against man-in-the-middle attacks and protection of components against modification and backup
- Insecure connections with SQLite or Firebase databases
- Black/grey box penetration testing
University Health Network: Streamline security, reduce staffing costs and protect patient data
UHN determined that Calian was its best ally in implementing a security system that could work seamlessly and effectively across its multi-site organization.
Those in cybersecurity know that incidences nearly always occur over the weekend or in the middle of the night, so it has given us a level of comfort in knowing we have 24-hour monitoring of our systems. Kashif Parvais, CISO, UHN
Modernize and secure your IT infrastructure
Speak to an expert to empower your organization’s success in the digital realm.
Calian's global operations
With four security operations centres globally, Calian provides support around the clock, from day to night, enhancing global security capabilities.
Current ITCS delivery areas
Regions coming soon