IT Security Services

GSS Infotech team was very quick and efficient in modifying the documents and finishing the deliverables. The first drafts of the Functional Spec were created in good time by the team.
Project Manager

A Leading Manufacturing Company

Services » IT Security Services » Vulnerability Testing

Vulnerability Testing

Vulnerability Testing

Customized exploitation and testing work to your environment and goals. Areas explored: Infrastructure Security & Application Security

Infrastructure Security:

  • External network vulnerability assessments
  • Internal network vulnerability assessments
  • Wireless security assessments
  • RDP assessments
  • Network architecture and firewall review
  • Host and network device review

Application Security:

Application vulnerability assessment is to identify and remediate vulnerabilities and maintain a resilient web presence. This process involves:
  • Web and client-server application security assessments.
  • Mobile application assessments across most platforms.
  • Software development lifecycle (SDLC) reviews
  • Application architecture assessments
  • Custom services as requested


> <
  • I. Data Gathering & Project Set up

    1. Review of the project assumptions 2. Detail list of IP addresses for scan 3. Arrange to configure (IDS/IPS) to accept the originating IP address 4. Optional scan using User credentials 5. Contact information for both parties 6. Plan the scans including time-of-day
  • II. Conduct Vulnerability Scans

    1. Perform an in-depth scan of the IP addresses provided and any optional User credential scans to identify security weaknesses and vulnerabilities
  • III. Vulnerability Research & Verification

    1. Verify all vulnerabilities discovered 2. Determine the potential impact of exploited vulnerabilities 3. Prioritize remediation efforts 4. Generate specific recommendations for remediation.