Internal Network Security • Penetration Testing • ISO Readiness
The client is a well-established Food Industry organization operating digital platforms including a public facing website and an internal ERP system used for production, logistics, and vendor management.
The client experienced rapid digital expansion and recognized the importance of securing their application layers. They were uncertain whether their current codebase and platform contained serious security vulnerabilities, and whether existing security controls were sufficient.
The client approached us with a concern regarding potential security weaknesses within their source code, and requested a detailed security code review insight and remediation plan.
Requested a security audit through source code review to identify potential risks that could compromise data integrity, availability, and confidentiality.
Reviewed all available development documentation and security-related policies (coding standards, change-management documentation, etc.)
Execution-based validation conducted using controlled testing to reproduce and confirm findings.
A total of 13 vulnerabilities were identified during the assessment. Below is an example of a high severity finding:
The login page database query was found vulnerable to SQL Injection in the txtEmail parameter. This allowed unauthenticated attackers to manipulate database queries and gain access.
CVSS Score: 10.0 (Critical)
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
A proof-of-concept exploitation was carried out using SQLMap: sqlmap --random-agent --skip-waf --forms --dbms mssql -u http://<ip>:<port>/
Attack outcome:
All findings were categorized and prioritised based on likelihood and business impact, creating a roadmap for resolution.
Delivered detailed documentation of findings and conducted a remediation workshop with the internal development team.