LAC Co., Ltd.

Taking full advantage of cutting-edge technology to make way for the future.

Report An Emergency Incident
Close

24-Hour Consultation, No Reservations Necessary

Emergency Inquiries: Cyber Emergency Center ®

Emergency Response Service to quickly support our customers during security-related emergency cases.
If you are in an emergency situation, please contact us now [Cyber Emergency Center]

For inquiries by email

email of Cyber Emergency Center ®

24-Hour Consultation, No Reservations Necessary

Emergency Inquiries: Cyber Emergency Center ®

If you are in an emergency situation, please contact us now [Cyber Emergency Center]

Security Assessment Service

LAC offers total penetration testing services for a wide range of environments from Web Applications, Network (including Wi-Fi), and Servers to Smart Devices to detect vulnerabilities in your IT network system and Protect you from cyber-attacks.

Outline

Strengths

We perform deep penetration scans not just with simple machine scans, but include manual testing to give you high-quality diagnostic results from real pseudo attacks.

Our network security experts perform sophisticated penetration testing from the attackers' point of view with their eyes and hands. Knowing the characteristics of your IT system, our network analysts and network engineers execute the best-fit methods to detect vulnerabilities.


Visualizing the latest attack methods and threats with our penetration techniques

Equipped with the most modern know-how and with many years of actual experience, our JSOC (24 x 7 security monitoring center), Cyber Grid Japan (R&D, dedicated to cyber security techniques and the latest threats) and our Cyber Emergency Center (cyber incident response team), collaborate together in performing various penetration techniques.


Track Record

Starting from 1995, LAC has achieved 6,300 testing as of Mar. 2015 both to private and public sectors.


Corresponding to Security Regulation and Guidelines

We follow security guidelines such as the "OWASP Top 10" required in PCI-DSS, as well as the local guidelines by the Japanese government; hence, the results could be used as evidence and a record for audit.

Service Flow

Service Flow

Major Assessment Items for Web Applications Assessment

No. Penetration Test Items Description
1 Security Against Cross-Site Scripting Verify whether the insertion of the script is possible. This makes it possible for malicious scripts to penetrate into the Web server and in response; the script will be executed on the Web browser of the clients. As a result, the attacker can steal the cookie information of the clients, and there is a risk that the attacker is able to log in pretending to be someone else.
2 Security Against SQL Injection Verify whether it is possible to use SQL command to illegally operate the database. If SQL injection to the database is possible, this could lead to unauthorized access to stored procedures and illegal calls to external programs. As a result, personal information may be accessed (information leakage), or changed (information falsification or loss) and, there is also a risk of unauthorized access and arbitrary commands on the server.
3 Session Management Security Verify whether there is a problem with the session management of Web applications. If the information that is used for session management can be guessed, screens that require authentication become accessible even without authentication or one is able to log in by pretending to be someone else. As a result, personal information may be accessed (information leakage), and, there is also a risk of unauthorized access to make changes (information falsification or loss).
4 Authentication Function Security Investigate safety against unauthorized access to bypass authentication. If authentication is bypassed, illegal access to a system will be carried out through login spoofing. As a result, personal information may be accessed (information leakage), and, there is also a risk of unauthorized access to make changes (information falsification or loss)
5 File Extensions Confirmation Verify the confirmation of the presence of common backup files and that data files are in accordance with the URL of the Web application. Successful exploitation may result in unauthorized access to restricted resources including personal information of users within the target Web application.
6 Security Against OS Command Injection An item to evaluate if it is possible to execute arbitrary OS commands by injecting meta characters or using SSI. If it is possible to execute arbitrary OS commands, the Web server OS may be controlled. Successful exploitation may result in theft of the Web server password file and administrator privileges.

Major Assessment Items for Platform Assessment

No. Category
1 Backdoors and Trojan horses
2 Brute force attack
3 CGI
4 DNS
5 Database
6 FTP
7 Finger
8 General remote services
9 Network appliance
10 Information gathering
11 Local
12 Mail
13 NFS
14 NNTP
15 Proxy
16 RPC
17 SMB / NETBIOS
18 SNMP
19 TCP/IP
20 Web
21 Windows

Output sample

The final report tells you about not only the level of security on your system but also details of findings and a recommendation for countermeasures.

Output sample