Сase study:
Telecom Operator
Penetration Testing of External and Internal Network Perimeters
The goal of this penetration test was to conduct a thorough third-party examination of the company’s external infrastructure to identify potential issues that could impact the security of applications, infrastructure, and user confidentiality. The assessment also reviewed security configurations ensuring the confidentiality, integrity, and availability of sensitive data and other resources.
Objectives and Requirements

Scanning the external network perimeter

Attempting to penetrate the company’s internal network

Scanning the DMZ zone and attempting to access the internal network

Exploiting any company-owned resources (external or internal) without impacting their operation
How it works
Penetration Test Phases
.png)
.png)
Phase 1: Preparation
Our team started with information gathering about the infrastructure. We performed vulnerability scanning to identify exploitable weaknesses. We exploited these vulnerabilities in a controlled environment to evaluate their potential impact, focusing especially on data disclosure scenarios. One of the most critical findings was a high-severity SQL Injection vulnerability.
.png)

Phase 3: Enumeration
Our pentesters used a multi-faceted approach including various testing strategies to maintain confidentiality of sensitive information.
.png)
Phase 2: Scanning
The ESKA team applied a comprehensive penetration testing methodology focused on systems critical to daily business operations. We identified key systems and infrastructure essential for business continuity, then scanned the network to discover devices and services, followed by vulnerability scanning to find weak points.
.png)
4
Phase 4: Exploitation and Reporting
The ESKA team applied a comprehensive penetration testing methodology focused on systems critical to daily business operations. We identified key systems and infrastructure essential for business continuity, then scanned the network to discover devices and services, followed by vulnerability scanning to find weak points.
.png)
Phase 4: Exploitation and Reporting
Using a risk-based testing methodology, the ESKA team focused on areas where an attack could cause the most damage. This included a combination of automated and manual testing techniques such as vulnerability scans, fuzzing, and targeted exploits.
After identifying vulnerabilities, we delivered a detailed report outlining our findings, potential impacts, and mitigation recommendations.
Key Findings

14 vulnerabilities were identified, with severity levels ranging from Informational to High.

Effective use of firewalls and WAFs successfully blocked active network and web scanning attempts.

Findings covered multiple categories including insecure protocol/service configurations, missing security headers, information leakage, and vulnerable software versions.

No critical or backend vulnerabilities compromising user confidential data were found during the test.

The external network had a low number of vulnerabilities and was generally well-configured.

Strong password policies prevented any successful brute-force attacks during the assessment.
Methodologies we use




Recommendations
For each vulnerability, we provided specific remediation advice in the report, including:

Implementing a robust patch management process.
.png)
Establishing an effective certificate management system.
.png)
Enforcing proper access control mechanisms for web applications, restricting usage to authorized employees only.
.png)
Ensuring regular and timely updates of all software components.
Conclusion
Our expert team at ESKA performed a comprehensive penetration test for a telecom company, uncovering significant issues and weaknesses in their systems. Identifying and addressing these vulnerabilities is essential to prevent potential data breaches and safeguard confidential information.
By simulating real-world attack scenarios, we assist companies in discovering and mitigating security gaps, ensuring the highest level of protection for their customers' data.
Impact
The penetration test not only identified critical vulnerabilities but also led to a significant improvement in the client’s overall security infrastructure. The proactive measures taken as a result of the test have made the platform more resilient to potential cyber-attacks, thereby safeguarding sensitive customer data and maintaining the integrity of the service.