Space Cellular
Contact us today on
91-22-65111883
About UsCompany ProfileCustomer CareRequest a Quote
Telecom ProductsElectronic SecurityIT Security LAB
space ETHICAL
space web
space crack

Best Telecom Products

RF ProductsOptical Fiber Products

Message from CEO

S K JalwalMr. S K Jalwal
(CEO, President)
I am proud to introduce "Space Cellular (P) Ltd", a company dedicated to marketing, sales and servicing of telecom equipments. We represent... Read more
SIM CARDS
ISO 9001:2008

Penetration Testing Services

IT Security Services

A penetration test is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source, known as a Black Hat Hacker, or Cracker.

What is the difference between a Pen Tester and a Hacker?

@

  • Pen Tester's have prior approval from Senior Management Hackers have prior approval from themselves.
  • Pen Tester's social engineering attacks are there to raise awareness Hackers social engineering attacks are there to trick the DMV into divulging sensitive information about the whereabouts of their estranged ex-spouse.
  • Pen Tester's war driving = geeks driving cars with really long antennas, license plate reading "r00t3d" while dying their hair green looking to discover the hidden, unapproved networks your users thought it would be OK to install for you.
    Hackers wireless war driving doesn't happen so often because 14 year olds typically don't have their license yet.
  • Pen-testers have pink mohawks and wear trenchcoats in July.
    Hackers have pink mohawks and wear trenchcoats.... that they bought with your bank account info.

Vulnerability Assessmen:

Typically is general in scope and includes a large assessment. Predictable. ( I know when those darn Security guys scan us.) Unreliable at times and high rate of false positives. (I've got a banner) Vulnerability assessment invites debate among System Admins. Produces a report with mitigation guidelines and action items.

Penetration Testing:

Focused in scope and may include targeted attempts to exploit specific vectors (Both IT and Physical) Unpredictable by the recipient. (Don't know the "how?" and "when?") Highly accurate and reliable. (I've got root!) Penetration Testing = Proof of Concept against vulnerabilities. Produces a binary result: Either the team owned you, or they didn't.

Scope of Penetration Testing

  • Targeted Recon.
  • Social Engineering
  • Physical facilities audit
  • Wireless War Driving
  • Dumpster Diving

Why Bother?

  • Active pen-testing teaches you things that security planning will not
    • What are the vulnerability scanners missing?
    • Are your users and system administrators actually following their own policies?
    • host that claims one thing in security plan but it totally different in reality
    • Audit Physical Security
    • Just what is in that building no one ever goes in?
    • The strongest network based protections are useless if there is a accessible unlocked terminal, unlocked tape vault, etc.
  • Raises security awareness
    • I better not leave my terminal unlocked because I know that those security guys are lurking around somewhere.
  • Helps identify weakness that may be leveraged by insider threat or accidental exposure.
  • Provides Senior Management a realistic view of their security posture
  • Great tool to advocate for more funding to mitigate flaws discovered
  • If I can break into it, so could someone else!



Our PRINCIPALS

SCL's strength lies in representing, renowned International companies like,
ACCUVER- USA, Optellent- AUS, HJ3W Inc-China, Sumitomo-Japan, Jiangsu Dong Ya Electronic Co. Ltd - China, EXFO-Canada, Forstar-China, Popular- China, Optone- Canada... many more

Home|Contact Us|CareersCopyright © spacecellular.com. All rights reserved