SERVICES
We offer red team activities through our strong staff who have gained competence in different fields of expertise. By implementing globally accepted standards and guidelines with our team's strong expertise, we ensure the provision of unique, globally valid, and effective solutions in the field of offensive security. Our penetration testing services are carried out under the guidance of our expert staff in accordance with the Turkish Standards Institution (TSE) "TS 13638 Authorization of Companies Providing Penetration Testing Services" principles and in accordance with the TSE standard.
The Red Team comprises a dedicated cyber security team to identify, assess and improve limitations and risks by targeting vulnerabilities, vulnerable areas, systems and users in the organization. By adopting a customized cyber security approach, our unique team consists of attack-oriented experts who are familiar with the methodology and technique used by a real cyber attacker.
We perform our Continuous Red Team (CRT) service starting from the external network with the black box method; we offer the opportunity to effectively test the defense mechanisms, response and detection times as well as detecting the vulnerabilities of the institution. We enable the organization we offer our service to perform vulnerability management and attack surface analysis on a 24/7 basis. One of the most efficient offensive security solutions that can be applied to instantly detect a vulnerability in the assets of the organization is the Continuous Red Team service.
Penetration Testing is a powerful security assessment method that includes a real attack simulation for network, system and application layers. With these tests that enable technological errors and vulnerabilities to be detected in advance; it is aimed to prevent the exploitation of security vulnerabilities by malicious people and to ensure the security of institutions, organizations and employees. In Penetration Tests, Penetration Test Standards determined in accordance with Turkish Standards Institute TS-13638 and standards such as NIST-SP800-115, PTES, OSSTMM and OWASP are taken as reference.
The tests within the scope of our Penetration Test Service are as follows:
These are the tests we have developed to scan possible vulnerabilities for network, operating system and applications and to detect configuration or version-based vulnerabilities. Within the scope of these tests, we check the inventories that harbor security risks and report the findings we have identified. After the vulnerabilities are closed, we carry out a detailed check that the necessary security measures are taken and the security of the organization is ensured by performing verification tests.
Our source code analysis solution stands out as the basic analyses to detect vulnerabilities that may arise from the codes running on the server side, apart from the vulnerabilities that can be seen by the endpoint, performed by the white box tests method. Software developed on open source or specifically for the project, excluding commercially licensed software, should be subjected to source code analysis in accordance with project management within the scope of the secure software development lifecycle. Our source code analysis performs critical functions such as detecting vulnerabilities that are likely to be exploited, as well as backdoor detection, detection of components that should remain confidential such as embedded keys, passwords, certificates, etc. in the code.

It is recommended to provide consultancy services on the closure of vulnerabilities reported to the institution by USOM and intelligence services or identified in the assets of the institution as a result of penetration testing, source code analysis and vulnerability scanning activities. While closing the vulnerabilities of the relevant units, we aim to ensure that the vulnerabilities are closed correctly with the guidance of our red team teams and cyclic testing activities.