top of page

Сase study:

Telecom Operator

Penetration Testing of External and Internal Network Perimeters

The goal of this penetration test was to conduct a thorough third-party examination of the company’s external infrastructure to identify potential issues that could impact the security of applications, infrastructure, and user confidentiality. The assessment also reviewed security configurations ensuring the confidentiality, integrity, and availability of sensitive data and other resources.

Objectives and Requirements

Featured icon.png

Scanning the external network perimeter

Featured icon.png

Attempting to penetrate the company’s internal network

Featured icon.png

Scanning the DMZ zone and attempting to access the internal network

Featured icon.png

Exploiting any company-owned resources (external or internal) without impacting their operation

How it works

Penetration Test Phases

Fill 1 (7).png
Heading (1).png

Phase 1: Preparation

Our team started with information gathering about the infrastructure. We performed vulnerability scanning to identify exploitable weaknesses. We exploited these vulnerabilities in a controlled environment to evaluate their potential impact, focusing especially on data disclosure scenarios. One of the most critical findings was a high-severity SQL Injection vulnerability.

Fill 1 (7).png
Heading.png

Phase 3: Enumeration

Our pentesters used a multi-faceted approach including various testing strategies to maintain confidentiality of sensitive information.

Group 1091 (1).png

Phase 2: Scanning

The ESKA team applied a comprehensive penetration testing methodology focused on systems critical to daily business operations. We identified key systems and infrastructure essential for business continuity, then scanned the network to discover devices and services, followed by vulnerability scanning to find weak points.

Fill 1 (7).png

4

Phase 4: Exploitation and Reporting

The ESKA team applied a comprehensive penetration testing methodology focused on systems critical to daily business operations. We identified key systems and infrastructure essential for business continuity, then scanned the network to discover devices and services, followed by vulnerability scanning to find weak points.

Fill 1 (7).png

Phase 4: Exploitation and Reporting

Using a risk-based testing methodology, the ESKA team focused on areas where an attack could cause the most damage. This included a combination of automated and manual testing techniques such as vulnerability scans, fuzzing, and targeted exploits.

After identifying vulnerabilities, we delivered a detailed report outlining our findings, potential impacts, and mitigation recommendations.

Key Findings

Featured icon.png

​14 vulnerabilities were identified, with severity levels ranging from Informational to High.

Featured icon.png

Effective use of firewalls and WAFs successfully blocked active network and web scanning attempts.

Featured icon.png

Findings covered multiple categories including insecure protocol/service configurations, missing security headers, information leakage, and vulnerable software versions.

Featured icon.png

No critical or backend vulnerabilities compromising user confidential data were found during the test.

Featured icon.png

The external network had a low number of vulnerabilities and was generally well-configured.

Featured icon.png

Strong password policies prevented any successful brute-force attacks during the assessment.

Methodologies we use
logo owasp.png
osstmm-blue-500px-300dpi-444x468.png
NIST_logo.svg.png
647f9245052fea000e98e957_optimized_259_e295x222-18x13.png
Recommendations
For each vulnerability, we provided specific remediation advice in the report, including:
Fill 1.png

Implementing a robust patch management process.

Fill 1 (1).png

Establishing an effective certificate management system.

Fill 1 (2).png

Enforcing proper access control mechanisms for web applications, restricting usage to authorized employees only.

Fill 1 (3).png

Ensuring regular and timely updates of all software components.

Conclusion

Our expert team at ESKA performed a comprehensive penetration test for a telecom company, uncovering significant issues and weaknesses in their systems. Identifying and addressing these vulnerabilities is essential to prevent potential data breaches and safeguard confidential information.

By simulating real-world attack scenarios, we assist companies in discovering and mitigating security gaps, ensuring the highest level of protection for their customers' data.

Impact

The penetration test not only identified critical vulnerabilities but also led to a significant improvement in the client’s overall security infrastructure. The proactive measures taken as a result of the test have made the platform more resilient to potential cyber-attacks, thereby safeguarding sensitive customer data and maintaining the integrity of the service.

Are you interested in learning more about this case or do you have similar security needs?

Protect your organization and client data—submit your request for penetration test from our experienced team using the form below. 

1 (8).png
bottom of page