our solutions

Penetration Test (Pentest) Services

Penetration Test (Pentest) Services

Pentest or Penetration Test means examining the target system with a hacker capability to reveal its vulnerabilities and exploit these vulnerabilities as much as possible. As Proya, we make a security assessment of your system in every aspect with our team that devotes their lives to cyber security and then present our evaluations as a final report. We perform our penetration testing services mainly by using manual skills and methods.

Our Penetration Tests consist of three steps: the Black Box test, which we do externally and physically using only the Internet environment, the Gray Box test that we do physically inside and over the internal network with the guest authorization, and the White Box test we do with an employee’s authorization. In this way, we reveal the 360-degree all-around security evaluation of the institution we serve.

The Penetration Testing services we offer as Proya cover many different specialized areas:

  • All of the corporate network, system, database and applications
  • Web applications
  • Wireless Networks
  • Source code analysis and evaluation
  • Virtual air gap and other diode solutions
  • Mobile apps (Android and iOS)
  • Software Defined Network (SDN) architectures
  • SCADA systems
  • All solutions in the cloud, including serverless
  • Internet of Things (IoT) devices
  • Original application security test

In our penetration test, we apply advanced reverse engineering methods when necessary and analyze the entire protocol or architecture of the target system or application to the finest detail.

Cyber Security Trainings

Cyber ​​security is essentially a race of knowledge with knowledge. A hacker achieves his goal with a vulnerability and vulnerability he can see better than those who run the system. The most important defense strategy against this is that the personnel who manage the corporate systems are at least as knowledgeable as a professional hacker.

Our training packages, which we have prepared with the approach of knowing the best defense attack, aim to bring our participants to the necessary competence in the operation of the Cyber ​​Operation Center with both Basic Applied Penetration Test and Basic Cyber ​​Defense Methods.

Our trainers are well-known respected people in his field around Turkey. Therefore, our trainees can learn both cyber attack methods and cyber defense approaches in a highly methodological manner.