SlideShare una empresa de Scribd logo
1 de 3
Deltecs’ Services for Information Security




              like
        Think like a Thief to catch a Thief




                                      |
          Deltecs Infotech Pvt. Ltd
Ph: 022-28488746 | 022-28481451
           Web: www.deltecs.com
          Email: info@deltecs.com
INTRODUCTION


Deltecs Infotech Pvt. Ltd, a leader in information security and penetration testing adopts
the tests listed in the OWASP Top Ten list, as well as the class of tests provided at
OWASC.
Deltecs’ Web Application Security process is a combination of comprehensive
vulnerability detection tests. It is run on the company’s web assets, like web servers, e-
mail servers, data centers, and third party applications running on servers.

With an exhaustive database of existing vulnerabilities Deltecs has an expertise in
vulnerability detection and remediation. The daily update of the database assures the
highest level of remote vulnerability detection available. Combined with an automated
process being managed by world class security experts, this provides an unparalleled
level of network perimeter security.

                                    Authentication


          Brute Force:
          A Brute Force attack is an automated process of trial and error
          used to guess a person’s username, password, credit card number
          or cryptographic key.

          Insufficient Authentication:
          Insufficient Authentication occurs when a website permits an
          attacker to access sensitive content or functionality without
          properly authenticate.

          Weak Password Recovery:
          Weak Password Recovery Validation is when a Website permits an
          attacker to illegally obtain, Change or Recover another user’s
          Password.


                                    Authorization


          Credentials/Session Prediction
          Credentials/Session Prediction is     a   method   of   hijacking   or
          impersonating a website user.

          Insufficient Authorization
          Insufficient Authorization is when a website permits access to
          sensitive content or functionality that requires increased access
          control restriction.

          Insufficient Session Expiration
          Insufficient Session Expiration is when a website permits an
          attacker to reuse old session credentials or session IDs for
          authorization.

          Session Fixation
          Session Fixation is an attack technique that forces a user’s session
          ID to an explicit value.
Client Side Attacks
Cross-site Scripting
Cross-site Scripting (XSS) is an attack technique that forces a
website echo attacker-supplied executable code, which loads in a
user’s browser.



                       Command Execution


SQL Injection
SQL Injection is an attack technique used to exploit websites that
construct SQL statements from a user-supplied input.


                   Information Disclosure

Directory Indexing
Automatic directory listing /indexing is a web server function that
lists all of the files within a requested directory if the normal base
file is not present.

Information Leakage
Information Leakage is when a website reveals sensitive data, such
as developer comments or error messages, which may aid an
attacker in exploiting the system.

Path Traversal
The Path Traversal attack technique forces access to files,
directories, and commands that potentially reside outside the web
document root directory.

Predictable Resource Location
Predictable Resource Location is an attack technique used to
uncover hidden website content and functionality.

                          Logical Attacks


Abuse of Functionality is an attack technique that uses a website‘s
own features and functionality to consume, defraud, or
circumvents access controls mechanisms.

Insufficient Anti-automation
Insufficient Anti-automation is when website permits an attacker to
automate a process that should only be performed manually.

Insufficient Process Validation
Insufficient Process Validation is when a website permits an
attacker to bypass or circumvent the intended flow control of an
application.

Más contenido relacionado

La actualidad más candente

Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelineswebhostingguy
 
Secure Code Warrior - Secure by default
Secure Code Warrior - Secure by defaultSecure Code Warrior - Secure by default
Secure Code Warrior - Secure by defaultSecure Code Warrior
 
Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level AttacksEC-Council
 
Secure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior
 
Secure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTerrance Medina
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentationConfiz
 
Secure Code Warrior - Issues with origins
Secure Code Warrior - Issues with originsSecure Code Warrior - Issues with origins
Secure Code Warrior - Issues with originsSecure Code Warrior
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server SecurityJITENDRA KUMAR PATEL
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With ExamplesAlwin Thayyil
 
Web Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and AuthorizationWeb Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and AuthorizationAndiNurkholis1
 
Possible security issues with data
Possible security issues with dataPossible security issues with data
Possible security issues with dataColonel_Black
 

La actualidad más candente (20)

Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 
Secure Code Warrior - Secure by default
Secure Code Warrior - Secure by defaultSecure Code Warrior - Secure by default
Secure Code Warrior - Secure by default
 
Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Secure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior - Least privilege
Secure Code Warrior - Least privilege
 
Secure Code Warrior - Fail securely
Secure Code Warrior - Fail securelySecure Code Warrior - Fail securely
Secure Code Warrior - Fail securely
 
Step by step guide for web application security testing
Step by step guide for web application security testingStep by step guide for web application security testing
Step by step guide for web application security testing
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 
Secure Code Warrior - Issues with origins
Secure Code Warrior - Issues with originsSecure Code Warrior - Issues with origins
Secure Code Warrior - Issues with origins
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Security 101
Security 101Security 101
Security 101
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
 
Web Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and AuthorizationWeb Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and Authorization
 
Possible security issues with data
Possible security issues with dataPossible security issues with data
Possible security issues with data
 
OWASP
OWASPOWASP
OWASP
 

Destacado

Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...Operator Warnet Vast Raha
 
Appreciation - Head of Sales, APAC at Hilton Worldwide
Appreciation - Head of Sales, APAC at Hilton WorldwideAppreciation - Head of Sales, APAC at Hilton Worldwide
Appreciation - Head of Sales, APAC at Hilton WorldwideProjjwal Ghosh
 
Residential Properties in Gurgaon
Residential Properties in GurgaonResidential Properties in Gurgaon
Residential Properties in Gurgaondgsrealtors6
 
Игровые автоматы. Наличие
Игровые автоматы. НаличиеИгровые автоматы. Наличие
Игровые автоматы. Наличиеavbazarov
 
Tienda SANTARÂ
Tienda SANTARÂTienda SANTARÂ
Tienda SANTARÂSANTARÂ
 
HadoopFundamentals
HadoopFundamentalsHadoopFundamentals
HadoopFundamentalsCalvin Tong
 
Electronic portfolio
Electronic portfolioElectronic portfolio
Electronic portfoliogracie
 
Lenard duvantiquementefactosobrerazonamiento
Lenard duvantiquementefactosobrerazonamientoLenard duvantiquementefactosobrerazonamiento
Lenard duvantiquementefactosobrerazonamientolenarduvan
 
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3NDNetwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND3ND B.V.
 
PFRH 3G-09-10 Relaciones Interpersonales
PFRH 3G-09-10 Relaciones InterpersonalesPFRH 3G-09-10 Relaciones Interpersonales
PFRH 3G-09-10 Relaciones InterpersonalesNELLYKATTY
 
PFRH DEPORTISTAS -Relaciones Interpersonales
PFRH DEPORTISTAS -Relaciones InterpersonalesPFRH DEPORTISTAS -Relaciones Interpersonales
PFRH DEPORTISTAS -Relaciones InterpersonalesNELLYKATTY
 
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositions
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositionsFacto Congres 2016 - eerlijk over morgen het belang van joint value propositions
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositionsFacto Magazine
 
5- 4 congressional committees
5- 4 congressional committees5- 4 congressional committees
5- 4 congressional committeesjpaone76
 
Types of chromatographic methods
Types of chromatographic methodsTypes of chromatographic methods
Types of chromatographic methodssumit prajapati
 

Destacado (19)

Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
Puji syukur kita panjatkan kehadirat allah swt yang telah memberi rahmat dan ...
 
Sample
SampleSample
Sample
 
A
AA
A
 
Appreciation - Head of Sales, APAC at Hilton Worldwide
Appreciation - Head of Sales, APAC at Hilton WorldwideAppreciation - Head of Sales, APAC at Hilton Worldwide
Appreciation - Head of Sales, APAC at Hilton Worldwide
 
Residential Properties in Gurgaon
Residential Properties in GurgaonResidential Properties in Gurgaon
Residential Properties in Gurgaon
 
Игровые автоматы. Наличие
Игровые автоматы. НаличиеИгровые автоматы. Наличие
Игровые автоматы. Наличие
 
Ms yatie
Ms yatieMs yatie
Ms yatie
 
Tienda SANTARÂ
Tienda SANTARÂTienda SANTARÂ
Tienda SANTARÂ
 
HadoopFundamentals
HadoopFundamentalsHadoopFundamentals
HadoopFundamentals
 
Electronic portfolio
Electronic portfolioElectronic portfolio
Electronic portfolio
 
Label tarikh
Label tarikhLabel tarikh
Label tarikh
 
Lenard duvantiquementefactosobrerazonamiento
Lenard duvantiquementefactosobrerazonamientoLenard duvantiquementefactosobrerazonamiento
Lenard duvantiquementefactosobrerazonamiento
 
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3NDNetwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
Netwerken in de wijk - Lijn1 Conf. Zorg voor de wijk - Nanne Dodde 3ND
 
PFRH 3G-09-10 Relaciones Interpersonales
PFRH 3G-09-10 Relaciones InterpersonalesPFRH 3G-09-10 Relaciones Interpersonales
PFRH 3G-09-10 Relaciones Interpersonales
 
PFRH DEPORTISTAS -Relaciones Interpersonales
PFRH DEPORTISTAS -Relaciones InterpersonalesPFRH DEPORTISTAS -Relaciones Interpersonales
PFRH DEPORTISTAS -Relaciones Interpersonales
 
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositions
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositionsFacto Congres 2016 - eerlijk over morgen het belang van joint value propositions
Facto Congres 2016 - eerlijk over morgen het belang van joint value propositions
 
5- 4 congressional committees
5- 4 congressional committees5- 4 congressional committees
5- 4 congressional committees
 
Recycled Glass
Recycled GlassRecycled Glass
Recycled Glass
 
Types of chromatographic methods
Types of chromatographic methodsTypes of chromatographic methods
Types of chromatographic methods
 

Similar a Deltecs Services for Vulnerability Assessment and penetration testing

Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application SecurityPrateek Jain
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3vhimsikal
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Richard Sullivan
 
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptx
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptxWebsite-Security-Protecting-Your-Digital-Assets-in-Development 23.pptx
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptxAttitude Tally Academy
 
Securing the Web @RivieraDev2016
Securing the Web @RivieraDev2016Securing the Web @RivieraDev2016
Securing the Web @RivieraDev2016Sumanth Damarla
 
Web Application Security Tips
Web Application Security TipsWeb Application Security Tips
Web Application Security Tipstcellsn
 
Secure code practices
Secure code practicesSecure code practices
Secure code practicesHina Rawal
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptxRRamyaDevi
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfSecure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfnanangAris1
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxInfosectrain3
 
Overview of RateSetter web security
Overview of RateSetter web security Overview of RateSetter web security
Overview of RateSetter web security RateSetter
 
OWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web DevelopersOWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web DevelopersBenjamin Floyd
 

Similar a Deltecs Services for Vulnerability Assessment and penetration testing (20)

Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
 
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptx
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptxWebsite-Security-Protecting-Your-Digital-Assets-in-Development 23.pptx
Website-Security-Protecting-Your-Digital-Assets-in-Development 23.pptx
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Securing the Web @RivieraDev2016
Securing the Web @RivieraDev2016Securing the Web @RivieraDev2016
Securing the Web @RivieraDev2016
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Web Application Security Tips
Web Application Security TipsWeb Application Security Tips
Web Application Security Tips
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfSecure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdf
 
Lets Make our Web Applications Secure
Lets Make our Web Applications SecureLets Make our Web Applications Secure
Lets Make our Web Applications Secure
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
 
gpt.AI.docx
gpt.AI.docxgpt.AI.docx
gpt.AI.docx
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
Overview of RateSetter web security
Overview of RateSetter web security Overview of RateSetter web security
Overview of RateSetter web security
 
OWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web DevelopersOWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web Developers
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Deltecs Services for Vulnerability Assessment and penetration testing

  • 1. Deltecs’ Services for Information Security like Think like a Thief to catch a Thief | Deltecs Infotech Pvt. Ltd Ph: 022-28488746 | 022-28481451 Web: www.deltecs.com Email: info@deltecs.com
  • 2. INTRODUCTION Deltecs Infotech Pvt. Ltd, a leader in information security and penetration testing adopts the tests listed in the OWASP Top Ten list, as well as the class of tests provided at OWASC. Deltecs’ Web Application Security process is a combination of comprehensive vulnerability detection tests. It is run on the company’s web assets, like web servers, e- mail servers, data centers, and third party applications running on servers. With an exhaustive database of existing vulnerabilities Deltecs has an expertise in vulnerability detection and remediation. The daily update of the database assures the highest level of remote vulnerability detection available. Combined with an automated process being managed by world class security experts, this provides an unparalleled level of network perimeter security. Authentication Brute Force: A Brute Force attack is an automated process of trial and error used to guess a person’s username, password, credit card number or cryptographic key. Insufficient Authentication: Insufficient Authentication occurs when a website permits an attacker to access sensitive content or functionality without properly authenticate. Weak Password Recovery: Weak Password Recovery Validation is when a Website permits an attacker to illegally obtain, Change or Recover another user’s Password. Authorization Credentials/Session Prediction Credentials/Session Prediction is a method of hijacking or impersonating a website user. Insufficient Authorization Insufficient Authorization is when a website permits access to sensitive content or functionality that requires increased access control restriction. Insufficient Session Expiration Insufficient Session Expiration is when a website permits an attacker to reuse old session credentials or session IDs for authorization. Session Fixation Session Fixation is an attack technique that forces a user’s session ID to an explicit value.
  • 3. Client Side Attacks Cross-site Scripting Cross-site Scripting (XSS) is an attack technique that forces a website echo attacker-supplied executable code, which loads in a user’s browser. Command Execution SQL Injection SQL Injection is an attack technique used to exploit websites that construct SQL statements from a user-supplied input. Information Disclosure Directory Indexing Automatic directory listing /indexing is a web server function that lists all of the files within a requested directory if the normal base file is not present. Information Leakage Information Leakage is when a website reveals sensitive data, such as developer comments or error messages, which may aid an attacker in exploiting the system. Path Traversal The Path Traversal attack technique forces access to files, directories, and commands that potentially reside outside the web document root directory. Predictable Resource Location Predictable Resource Location is an attack technique used to uncover hidden website content and functionality. Logical Attacks Abuse of Functionality is an attack technique that uses a website‘s own features and functionality to consume, defraud, or circumvents access controls mechanisms. Insufficient Anti-automation Insufficient Anti-automation is when website permits an attacker to automate a process that should only be performed manually. Insufficient Process Validation Insufficient Process Validation is when a website permits an attacker to bypass or circumvent the intended flow control of an application.