Consulting Services

The thousands of network nodes running inside your organisation not only needs continuous monitoring of their logs
but a red team continuously trying to break into your infrastructure equipped with the most updated exploit library,
both public and private such that we can not only to provide you with the most comprehensive assessment report with our semi-automated methodology,
but also to help you address the gaps identified in the report.

Scope of Infrastructure VM

Internal Network VM

We are given an access to your internal network where we perform our scans across each device in the network and produce a report and then help you patch the identified gaps.

Network Perimeter VM

Your external facing Network Perimeter with devices and their ports running services are accessible to anyone and everyone from around the globe. They need to be continuously scanned and monitored for any potential vulnerabilities and threats.


Network Architecture VM

A large number of times, even after having the best of equipments installed and working within your network it becomes vulnerable to multiple types of attacks, both from outside and inside your organisation. Architecture review allows us to identify such gaps and help you plug them.

Execution Process

Pre Execution
Gap Analysis
Quick 90 Day Fixes


Actual Scan Methodology

Live systems identified in the above phase will be actively probed for responses that will reveal its operating system and version level. This activity helps to identify the known operating system vulnerabilities and loopholes which can be patched afterwards with the help of vendor advisory. Outcome of this activity

  • OS type (32/64 bit)
  • System type (Windows/Linux/Unix)

In this phase, E2Labs analyst will map the entire network as observed by him/her during the discovery and fingerprinting phase. This activity will help analyst to prioritize the network segment during the subsequent phases and obtain blueprint of the organization.

The aim of this phase is to identify open ports and services running on them. Testing of different ports and services depends upon the operating system types and services running on it. NMap and Unicornscan along with custom scripts incorporating OpenSSL and Netcat will be used by our analysts. Outcome of this activity will consist:

List of open/closed/filtered ports

  • Service types (SMTP, DNS, HTTP, FTP, SSH, etc.)
  • Service application type (PureFTPD, openSSH, etc.)

This phase provides holistic approach for risk management to an enterprise. Based on the information collected in first 4 phases, E2Labs analyst will find security weaknesses in target systems. It helps to identify how attack can be launched using identified entry points in the systems. This activity is carried out with the help of well-known commercial and non-commercial tools such as Nessus, OpenVAS, Metasploit, etc. in addition to manual approach incorporating in-house scripts. Results of the automated scanners are manually verified in the next phase of the assessment. Types of checks performed are known vulnerabilities identification, configuration flaws, default credentials, patch level, etc.

The vulnerability assessment of any identified web application is conducted based on E2Labs Application Security Controls List. Verification: In above ‘vulnerability assessment’ phase, automated scanning tools generate multiple reports along with multiple vulnerabilities at various threat levels. The first action taken by E2Labs NISE (Network Intelligence and Security Experts) team is to thoroughly analyze and validate each test results generated by the above mentioned tools. It gives client the guarantee of ZERO false positives result at the end.

In order to gauge the business impact of identified vulnerabilities, E2Labs analysts may perform controlled exploitation with the client’s prior permission. This phase is not mandatory. However for the client’s better understanding and to evaluate threat, this activity is recommended for the sample set of vulnerabilities. Outcome of this activity will consist:

  • Proof of Concepts of successful exploitation

An in-depth network security assessment report will be submitted to the network security team. Also an executive summary report will be provided for the project coordinator and business team.

These are the report highlights:

  • Summary of the approach
  • scope details
  • Vulnerabilities identified
  • Vulnerabilities identified
  • Business Impact
  • Remediation
  • References and the guarantee of ZERO false.
  • Positive result at the end.

Cloud Solutions

The benefits of the everything-as-a-service cloud model are hard to ignore.

Read More

Managed Security Services

You want to mitigate the impact of security breaches to avoid data loss

Read More

Data Centre

Our data centers provide a secure, dedicated environment where you can

Read More

CA Enterprise PKI

Enterprise Public Key Infrastructure (PKI) is a rapidly emerging technology

Read More

Risk & Compliance

To protect your reputation and earn your customers’ trust, it’s critical to ascertain your

Read More

Computer Forensic Investigations

Computer forensics involves acquiring, Examining, analyzing and presentation

Read More

PCI Compliance

Any organization that handles credit card data is required to meet

Read More

Security Audit

Vulnerability Assessment (VA) is the process of identifying and quantifying

Read More

Web Penetration Services

Secure Your Applications and Your Reputation Hackers like to target

Read More

National Security Advisory

National Security Advisory that takes care of every aspect of learning in a

Read More

In House Corporate Training

Hands on WebApplication & Web Penetration Security, Reverse Engineering

Read More

Security Awareness Bootcamps

Boot camp is a complete package that takes care of every aspect of learning in a

Read More


Years of Experience

Lakh Students Trained

90 %
Placed in MNCs

Global Staff

Execution Scope

IT Security Execution Scope

Contact Us

© Copyright 2012, All Rights Reserved E2Labs Information Security