Security Penetration Testing

Protecting Your Business with Industry Leading Penetration Testing

free website creation software

Why Pen-test is Important for Business

Security attacks may compromise your sensitive data, which leads to the loss of trusted customers and serious reputational damages. Penetration testing can help you avoid costly security breaches that put your organization’s reputation and customers’ loyalty at stake

01.

Meeting compliance

To mitigate the real risks associated with the network

02.

Avoid further expenses

Needless to say, data breaches cost companies a lot

03.

Preserve company's image

Avoid costly security breaches that put your organization’s reputation and customers’ loyalty at stake.

Our Methodology


Telkomtelstra methodology for testing is primarily through the use of security tools and manual techniques performed in a methodological approach as described by the diagram. Utilizing guidance from internationally recognized methodologies, telkomtelstra will conduct testing through a series of phases.

Web Application Testing Methodology

Web Application Testing Methodology

Web application testing focuses on identifying and exploiting vulnerabilities found in the web application. Telkomtelstra utilizes the following approach based on a number of internationally recognized methodologies. The process involves an active analysis of the application for any weaknesses, technical flaws or vulnerabilities. The OWASP and other testing methodologies will be used to review custom application code and identify coding vulnerabilities.

Infrastructure Testing Methodology

Infrastructure Testing Methodology

Our methodology and approach is described below and is tailored to meet the specific requirements for this assignment. Telkomtelstra takes best practice guidance from both OWASP (Open Web Application Security Project) & OSSTMM (Open Source Security Methodology Manual) methodologies to ensure the most complete approach to testing, utilizing both commercial and publicly available tools. This following type of approach is used commonly by malicious hackers and allows us to comprehensively identify and exploit the targeted systems.

OWASP (Open Web Application Security Project)

OWASP (Open Web Application Security Project)

OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted

OSSTMM (Open Source Security Testing Methodology Manual)

OSSTMM (Open Source Security Testing Methodology Manual)

By using the OSSTMM you no longer have to rely on general best practices, anecdotal evidence, or superstitions because you will have verified information specific to your needs on which to base your security decisions


Telkomtelstra will focus on testing the security architecture and the associated security controls residing on the tested environment. The test will simulate an unauthorized / authorized user with no access / full access granted in an attempt to escalate full privileges with limited / in depth knowledge of the system.

What'll You Get

  • Executive summary: Executive level summary of the results of the assessment
  • Introduction: Background information on the tests conducted
  • Vulnerability findings: A comprehensive account of the findings from the assessment
  • Description of the risk associated to the finding according to the following categories: Critical, High, Medium, Low
  • Recommendations: Mitigation strategies to address the findings from the assessment

Our Contacts

Address:

Tower 88@Kota Kasablanka, 35th floor
Jl. Casablanca No.88, RT.14/RW.5, Menteng Dalam, Tebet, South Jakarta City, Jakarta 12870

Phone:

+62 21 8064 0600

© Copyright 2020 telkomtelstra - All Rights Reserved