Vulnerability Assessment Penetration Testing


Vulnerability Assessment (VA) is an automated scan of your network infrastructure that allows the customer to view the security status of its systems to any known vulnerabilities. With this objective, automatic scans are used to carry out a series of checks on every system/application to understand their configuration in detail and detect any vulnerability. These checks function at a high rate using this automated software resulting in covering a wide perimeter in a short period. Additionally, the usage of automated tools makes it impossible to extend checks beyond the vulnerabilities for which the specific tool is. To check the real possibilities, an attacker would have to exploit the vulnerabilities.

    To fill that gap, Krash Consulting also offers its expertise in the field of Penetration Testing (PT). During a Penetration test, intrusion simulations are carried out using different attack scenarios and combining manual techniques with automated tools.

      We offer two types of Network Penetration Tests:

    • External Network VAPT
    • Internal Network VAPT


      One of the most prevalent penetration testing activities from start-ups to world-leading organizations, is External Vulnerability Assessment Penetration Testing, typically targeting internet-facing websites. As we provide services for vulnerability assessments and penetration testing for all scale enterprises; scanning of external-facing network resources is crucial, and a high priority. But we also challenge you to understand that scanning alone is not enough unless all you want is a checkmark for an audit of one kind or another.

      Krash Consulting offers you a thorough job of assessing the hardness of your external network, which consists of several phases realized per OSSTMM. This black box type of penetration test executed from the perspective of an unethical attacker who does not have any information about testing topology and services.

      Our Testing includes but is not limited to:

      Information collection – all information related to the target system is obtained, classified, and analyzed, including the version of the webserver, modules used, programming platform, WAF, and access points to the application.

      Enumeration and Scanning of Vulnerabilities – employing intrusive methods and techniques, potential vulnerabilities are recognized using special scanners, fault-injection proxies as well as manual verification.

      Vulnerability control – application of security scan to detect existing vulnerabilities in services identified during TCP/UDP port-scan.

      Penetration – an attempt to exploit available vulnerabilities, insufficient configuration. For penetration to other systems and devices, an increase of user rights and access to resources.

      Use of vulnerabilities – attempt to gain access by using vulnerabilities identified in the previous phase of testing. The goal is to gain user access or privileged (Administrator) access to the application or operating system by using individually customized scripts and exploit methodology.

      Testing of mail server – in addition to the screening of known vulnerabilities, several detailed SMTP tests are executed to verify any relaying problems of the Exchange Servers. All the possibilities for abuse of the SMTP servers by spammers and the resistance of server to potential DOS attacks discovery are verified. Additionally, vulnerabilities and weaknesses of any anti-virus and anti-spam implementations that could be potentially exploitable are discovered.

      Testing DNS zones – In addition to the testing of known vulnerabilities of the concrete implementation of the DNS server, tests are executed for consistency of all the zones on all DNS servers. The possibility of public zone transfer and vulnerability of DNS caching attacks are checked as well.


      Most organizations assume that attackers are outside their network and, therefore, only need to take care of their perimeter security. Unfortunately, this assumption is the source of many data leaks affecting organizations. An internal network penetration test can help understand how a single infected computer or stolen credentials or rogue employees can undermine your organization’s security.

      Krash​ ​Consulting’s​ ​Penetration​ ​Testing​ ​campaign​ ​includes​ ​both​ ​automation​ ​testing​ ​and manual​ ​testing​ ​with​ ​a​ ​standard​ ​ratio​ ​of​ ​1:9​ ​respectively​ ​to​ ​perform​ ​its​ ​services effectively.

      Some​ ​of​ ​the​ ​techniques​ ​used​ ​are​ ​associated​ ​with​ ​vulnerability​ ​scanning​ ​to​ ​perform​ ​tests are​ ​automated,​ ​such​ ​as:

      • Network​ ​scanning​ ​using​ ​various​ ​methods​ ​(e.g.​ ​SYN​ ​scans,​ ​UDP​ ​scans,​ ​ACK scans)
      • Vulnerability​ ​scanning​ ​to​ ​identify​ ​various​ ​low-hanging​ ​vulnerabilities
      • Specialised​ ​network​ ​scanning​ ​for​ ​specific​ ​protocols​ ​(such​ ​as​ ​SIP,​ ​IPMI​ ​and​ ​SNMP)

      For a Penetration Test to be beneficial, we perform many manual tests allowing us to simulate real attackers which includes, but not limited to:

      • Man-in-the-Middle​ ​attacks
      • The exploitation​ ​of​ ​software​ ​that​ ​has​ ​not​ ​been​ ​hardened​ ​or​ ​securely​ ​configured
      • Exploitation​ ​and​ ​demonstration​ ​of​ ​known​ ​vulnerabilities​ ​which​ ​are​ ​typically detected​ ​through​ ​network​ ​scanning​ ​but​ ​not​ ​verified
      • Pass-the-hash​ ​(PtH)​ ​attacks,​ ​lateral​ ​movements,​ ​NTLM​ ​offline​ ​bruteforce, credential​ ​dumping​ ​etc.
      • Default​ ​or​ ​weak​ ​credentials
      • Lack​ ​of​ ​network​ ​access​ ​control​ ​and​ ​proper​ ​network​ ​segmentation
      • Ways​ ​to​ ​bypass​ ​or​ ​abuse​ ​security​ ​solutions
      • Obvious​ ​security​ ​issues​ ​within​ ​the​ ​target​ ​software​ ​(low​ ​hanging​ ​fruit)

      Krash​ ​Consulting’s​ ​Network​ ​Penetration​ ​Test​ ​is​ ​a​ ​hand-crafted​ ​and​ ​thoroughly​ ​executed assault​ ​on​ ​your​ ​systems​ ​and​ ​applications. Our​ ​goal:​ ​to​ ​reveal​ ​any​ ​hidden​ ​threats​ ​and​ ​vulnerabilities​ ​so​ ​you​ ​can​ ​take​ ​action​ ​to address​ ​them.

Planning & execution by highly skilled cybersecurity experts

Krash​ ​Consulting​ ​penetration​ ​testers​ ​run​ ​a​ ​full​ ​series​ ​of​ ​hand-crafted​ ​simulated​ ​attacks against​ ​your​ ​systems​ ​and​ ​applications.​ ​We​ ​view​ ​your​ ​systems​ ​the​ ​way​ ​an​ ​intruder would​ ​–​ ​anything​ ​from​ ​a​ ​teen​ ​thrill-hacker​ ​to​ ​malicious​ ​assaults​ ​by​ ​highly​ ​skilled adversaries.​ ​Our​ ​personnel​ ​can​ ​quickly​ ​identify​ ​the​ ​most​ ​likely​ ​vectors​ ​for​ ​attacks.

A firmly established level of effort

Our​ ​methodology​ ​includes​ ​a​ ​clear​ ​understanding​ ​of​ ​which​ ​assets​ ​are​ ​within​ ​the evaluation​ ​boundary.​ ​This​ ​level​ ​of​ ​effort​ ​can​ ​be​ ​correlated​ ​to​ ​the​ ​​ ​importance​ ​of​ ​the systems,​ ​the​ ​system​ ​owner’s​ ​risk​ ​aversion,​ ​or​ ​the​ ​anticipated​ ​motivation​ ​of​ ​adversaries.

Thoroughly researching your employees

We​ ​also​ ​research​ ​your​ ​users​ ​through​ ​Open​ ​Source​ ​Intelligence​ ​(OSINT)​ ​sources​ ​such​ ​as social​ ​networking​ ​sites,​ ​online​ ​trade​ ​journals,​ ​and​ ​others.​ ​There​ ​we​ ​can​ ​gather​ ​clues about​ ​potential​ ​usernames,​ ​passwords,​ ​roles-based​ ​privileges,​ ​and​ ​other​ ​information that’s​ ​useful​ ​for​ ​“breaking​ ​and​ ​entering.”​ ​(Sounds​ ​scary,​ ​right?​ ​It​ ​is.​ ​But​ ​that’s​ ​what​ ​the bad​ ​guys​ ​do.​ ​And​ ​you​ ​want​ ​us​ ​thinking​ ​and​ ​acting​ ​like​ ​bad​ ​guys).

Strict rules of engagement

We​ ​establish​ ​a​ ​strong,​ ​concise​ ​document​ ​signed​ ​by​ ​both​ ​parties​ ​that​ ​establishes​ ​the ground​ ​​ ​rules​ ​for​ ​your​ ​engagement,​ ​including​ ​when​ ​and​ ​where​ ​we​ ​will​ ​be​ ​testing,​ ​which systems​ ​we’re​ ​attacking,​ ​start​ ​and​ ​stop​ ​rules,​ ​and​ ​other​ ​guidelines​ ​for​ ​our​ ​mutual protection​ ​and​ ​security.

Hand-crafted penetration attempts

Utilizing​ ​the​ ​results​ ​of​ ​the​ ​tools​ ​and​ ​the​ ​research,​ ​Krash​ ​Consulting​ ​analysts​ ​conduct hand-crafted​ ​penetration​ ​attempts​ ​to​ ​determine​ ​areas​ ​of​ ​weakness.​ ​Our​ ​security experts​ ​besides​ ​being​ ​skilled​ ​in​ ​penetration​ ​testing,​ ​they​ ​are​ ​proficient​ ​in​ ​area​ ​of exploitation​ ​and​ ​reverse​ ​engineering​ ​which​ ​makes​ ​them​ ​exclusive​ ​in​ ​their​ ​area​ ​leaving none​ ​for​ ​competition.

Thoroughly documented reports and suggestions

Documenting​ ​the​ ​results​ ​of​ ​all​ ​major​ ​penetration​ ​attempt​ ​vectors,​ ​Krash​ ​Consulting prepares​ ​and​ ​delivers​ ​a​ ​report​ ​detailing​ ​the​ ​types​ ​of​ ​tests​ ​that​ ​were​ ​attempted,​ ​the status​ ​of​ ​their​ ​success​ ​or​ ​failure,​ ​any​ ​discovered​ ​issues​ ​and​ ​the​ ​resultant​ ​risks​ ​(sorted by​ ​priority),​ ​and​ ​suggested​ ​remediation​ ​efforts.​ ​In​ ​order​ ​to​ ​address​ ​your​ ​comments​ ​and feedback,​ ​we​ ​may​ ​provide​ ​draft​ ​and​ ​final​ ​versions​ ​of​ ​the​ ​report.

Our​ ​methodology​ ​is​ ​also​ ​consistent​ ​with​ ​guidance​ ​from​ ​external​ ​organizations​ ​such​ ​as OWASP​ ​(Open​ ​Web​ ​Applications​ ​Security​ ​Project),​ ​National​ ​Institute​ ​of​ ​Standards​ ​and Technology​ ​(NIST)​ ​and​ ​Open​ ​Source​ ​Security​ ​Testing​ ​Methodology​ ​Manual​ ​(OSSTMM).

CALL​ ​US​ ​AT:​ ​+91​ ​95383​ ​61786

Get​ ​Started​ ​Now​ ​Discovering​ ​and​ ​Fixing​ ​the​ ​Threats​ ​to​ ​Your​ ​IT​ ​Environment.

There’s​ ​an​ ​old​ ​saying:​ ​“The​ ​best​ ​time​ ​to​ ​plant​ ​a​ ​tree​ ​is​ ​20​ ​years​ ​ago.​ ​The​ ​second-best​ ​time​ ​is today.”​ ​There’s​ ​no​ ​better​ ​time​ ​than​ ​now​ ​to​ ​start​ ​uncovering​ ​and​ ​addressing​ ​the​ ​vulnerabilities that​ ​can​ ​cause​ ​no​ ​end​ ​of​ ​expense,​ ​embarrassment,​ ​and​ ​litigation​ ​for​ ​your Organization.

It’s​ ​easy​ ​to​ ​get​ ​started​ ​and​ ​costs​ ​less​ ​than​ ​you​ ​probably​ ​think.

So​ ​please​ ​contact​ ​us.​ ​​Today​.