Since 2002 we have been in the business of protecting our clients’ financial and customer data. As an information security company we use a variety of techniques to prevent and minimise the effect that cyber attacks may have on your organisation. View our company profile here.
Our Aim
To ensure that your systems are as unattractive to cybercriminals as possible minimising your cyber security risk landscape.
What We Do
We provide the highest level of IT security solutions for various sectors both locally and internationally including advisory, penetration testing, vulnerability assessments, red teaming, social engineering and training. When it comes to our reporting, we have, and always will, focus on vendor-independent reporting ensuring an unbiased view of the findings.
BBBEE
As a proud level 2 BBBEE service provider we are invested in the future of South Africa.
Gallery
A picture speaks a 1000 words, view some of ours here.
Advisory services allow us to offer you our expertise either via Service Level Agreements (SLAs) or as part of our Continuous Red Team (CRT) Assessments.
We offer a variety of training courses which are fun, practical, extremely hands on and very informative. These courses have been conducted locally and internationally at some of the most prestigious security events and have been identified by some of the industries most renowned players as very valuable.
Through our security assessments and as part of our research, Telspace Africa's analysts routinely discover zero-day vulnerabilities in a number of software products. We follow our established responsible disclosure policy when communicating with vendors and provide them with detailed technical information, as well as proof of concepts regarding the flaws we find. For a list of our published security advisories please visit our blog.
Telspace Africa regularly presents at high-level goverment and internationally recognised security confrences. We are often interviewed locally and internationally by magazines, television and newspapers.
This course is an introduction to the basics of ethical hacking. It covers most of the aspects one requires to get started in this field. It has been created for students with limited to no prior experience with ethical hacking. This very exciting course will take each student through the process of ethical hacking, from setting up your virtual machines or desktops to prepare for assessments, through to enumeration and exploitation of networks and systems. This course focuses on attack and defence from an ethical and black hat point of view.
Who should attend
General IT Security specialists and administrators
IT Security Specialists who are interested in hacking
Security Officers for organisations and companies
Network administrators
Any individual who may be interested in these topics
Course Topics
Penetration testing methodology (White Box, Black Box and Gray Box)
Your target and information gathering
Mapping vulnerabilities
Social Engineering
Exploitation of mapped vulnerabilities
Privilege escalation
Maintaining access and pivoting
Course Duration
2 Days
Prerequisites
Basic knowledge of TCP/IP networks
Participants must bring their own laptop that is able to boot from a USB and / or CD ROM
Participants must have administrative rights to install software on their laptop
This course hopes to demystify threats web developers are faced with when developing web applications. Even for the aspiring web security analyst, this course will discuss all attack vectors in hacking web sites including those identified by OWASP. From an in depth view into profiling, authentication bypassing to attacking web platforms. If you are interested in web hacking this course is a must and should not be missed.
Who should attend
IT Security Specialists who are interested in hacking
Security Officers for organisations and companies
Network administrators
Any individual who may be interested in these topics
Course Topics
Overview of Attacks
Attack Methods
Attacking the client side
Securing Web Applications
Course Duration
2 Days
Prerequisites
Basic knowledge of TCP/IP networks
Participants must bring their own laptop that is able to boot from a USB and / or CD ROM
Participants must have administrative rights to install software on their laptop
If no security contact is known for the vendor, an e-mail requesting the security contact e-mail address will be sent to certain public e-mail addresses associated with the vendor.
The vendor will be given 2 weeks (10 working days) from the date of contact for an initial response. Should no contact occur by the end of 2 weeks (10 working days), Telspace Africa will evaluate the risk to our clients and may decide, at a minimum, to disclose the vulnerability to our clients.
The vendor will be given a maximum of 90 days after date of contact to release a patch. After 90 days Telspace Africa will consider public disclosure, unless the vendor asks for more time.
The vendor is responsible for providing regular status updates (regarding the resolution of the vulnerability). If the vendor discontinues communication at any stage of the process for more than 30 days after date of contact, Telspace Africa will view the vendor as non-responsive and will consider public disclosure.
The vendor is encouraged to provide proper credit to Telspace Africa and to the researcher responsible for discovering the vulnerability. An acceptable credit is : "Credit to [Name of researcher] of Telspace Africa”.
The vendor is encouraged to coordinate a joint public release/disclosure with Telspace Africa so that advisories of the vulnerability and resolution can be made available together.
If the vulnerability is being actively exploited in the wild Telspace Africa will work with the vendor on an escalated disclosure timeline, potentially less than seven days, after date of contact i.e. if exploitation is experienced on a wide and public scale.
The vulnerability information will be published by Telspace Africa when: a) The agreed disclosure date is reached and / or one of the aforementioned conditions are reached b) The vendor issues a fix/patch and / or security advisory.
We will work with the affected party to ensure that a CVE entry, which is used to track vulnerabilities, is assigned to the vulnerability whenever possible, either alongside the reported vulnerability or after the fix/patch.
For any other questions or concerns related to our approach to vulnerability disclosure, please contact us at [email protected]
Wireless Hacking 101
About the Course
This training course hopes to demystify threats people are faced with when using wireless technology, and to give you a greater understanding of techniques and tools used by attackers in compromising wireless networks. This includes how to have fun with the various techniques taught in the course.
Who should attend
General IT Security specialists and administrators
IT Security Specialists who are interested in hacking
Security Officers for organisations and companies
Network administrators
Any individual who may be interested in these topics
Course Topics
Introduction to wireless hacking
Wireless protocols and architecture
Network mapping and methodology for securing wireless networks
Wireless hacking tools and attacks
Defending against wireless hacking
Course Duration
2 Days
Prerequisites
Basic knowledge of TCP/IP networks
Participants must bring their own laptop that is able to boot from a USB and / or CD ROM
Participants must have administrative rights to install software on their laptop
The Social Engineering 101 course is geared at corporates who require assistance in training their staff up against social engineering attacks. The course duration and topics are determined based on who is attending the training i.e. the course is tailor made / adapted based on who is attending the training. This allows for more targeted and effective training.
Who should attend
All employees
Course Topics
What is social engineering
The human weakness
Different types of social engineering attacks (chosen based on which stakeholders are attending the training)
How to defend against social engineering attacks
Course Duration
Dependent on which stakeholders the training is for but typically between 4 to 8 working hours
ITWeb Security Summit 2015 – Speakers, Sponsors and Exhibitors
ITWeb Security Summit 2015 – Speakers, Sponsors and Exhibitors
Limpopo ICT Youth Conference 2015 - Speakers
and many more
Advisory Services
CRT & Advisory
Continuous Red Team (CRT) testing with Advisory Service gives you a holistic overview of your security posture by conducting various assessments covering a wide scope.
This includes internal and external attack and penetration tests, mobile application assessments, wireless network assessments and social engineering.
Advisory Services are often paired with CRT testing in order to assist with transferring valuable skills to your Internal Security and IT Audit staff. These assessments are normally conducted over twelve months.
Service-Level Agreement
This agreement is perfect for those with smaller IT budgets, or larger corporates that would like to maintain the work that was done as part of a larger vulnerability assessment. You can utilise consulting hours or days as required, in terms of our service portfolio offerings.
This option is done on a month-to-month basis and can include the following services as per your individual needs:
Informing companies of new security trends
Information and new products available
Participation in new infrastructure rollout meetings
Serving as an advisory board for the company on security concerns and issues
Assessments on demand that would take up consulting hours or days
Identify and help mitigate risks on an ongoing basis
The objective of this service is to identify and report on security vulnerabilities on a wide level to allow you to close the issues, thus raising the level of your security protection overall.
Read more...
Full disclosure test (White Box)
This test is conducted by allowing us complete access to information about the target that would otherwise be unavailable to external intruders, such as targets locations, various network diagrams, and source code. This assessment best simulates an internal attacker/threat could do with information about your systems. A typical engagement includes a standard network topology.
Blind Test (Black Box)
Here we simulate an intruder's view of the target, only information that can be acquired by an actual attacker is used to conduct the test. For example, we only know about your company and what you do no additional information is provided. Blind tests are good assessments but do not take into account insider threat.
Partial Disclosure Test (Grey Box)
This can be considered a variation between a full disclosure and a blind test. Specific information might be disclosed about target(s), but not to the same extent as a full disclosure test. This is often the choice if you require a happy medium.
Web Application Assessments
Our manual web application assessments identify and report on security issues related to online web applications.
Our assessments make use of hands on methods (not tools) and typically we assign one or two security analysts to new engagements.
Read more...
White Box Testing (Code Review)
When a white box assessment is chosen, we review each line of code in a specific web application for various security issues and bugs. This is a tedious task but is often necessary to solve any bugs that would not usually be found when utilising the black box method. The white box assessment usually takes a longer period of time than the black box method, however it is usually more extensive and produces better results.
Black Box
A more popular method of testing websites is the black box web application assessment. When you choose this option, we do not have access to source code or any information that assists us in finding out exactly how that web application is coded.
Essentially, we do not have access to the way the web application is put together and coded.
This is a more effective attackers view of the web application and is a shorter test in general.
We alway recommend a web application assessment prior to the actual release of the web application. This will allow the client to close serious issues pre-production - it is always better to be proactive about security, as opposed to reactive.
Mobile Application Assessments
The mobile application assessment services are in many ways similar to our web application assessment services, they are often built on existing web-based components, therefore mobile applications are also susceptible to similar security vulnerabilities.
Read more...
Our mobile application assessments are a manual, hands on assessment which can be conducted for applications running on operating systems such as iOS, Android, Blackberry OS & Windows Mobile.
We will provide your organisation with insight into how well your applications protect sensitive information. This would include various forms of penetration testing attacks, business logic attacks and identifying vulnerabilities that can be addressed before putting the application into production.
Red Teaming
Hire us to mimic your real-world adversaries! Rather us than a real criminal right? Our Red Team assessment is the most realistic and comprehensive assessment that we offer. During these assessments, we find entry points into the organisation by any means possible. Red Team assessments are best if you want to see what techniques real-world adversaries, that aren't constrained by scope, might use.
Read more...
They are also a great way to test your defenses as only a handful of individuals are aware of the assessment, security teams will be left to react as if it is a real attack.
Why do a Red Team assessment if you already do penetration testing assessments?
Red Team assessments have a broader scope.
Red Team assessments will test your detections and mitigation controls.
Add in, Teams are not aware of which systems will be targeted and when, making it more realistic of a real world attack.
In some instances, teams "harden" systems before penetration tests which leads to a false sense of security.
Traditional Red Team
When you choose this option the engagement is typically 6 - 12 months. During this time we try various techniques to compromise the organisation e.g. Social Engineering, Web App attacks, access control card cloning, WiFi attacks and many more.
Once we achieve our objectives the assessment stops and we come and present the results. This is always an eye-opener for organisations.
Continuous Red Team (CRT)
This assessment is basically identical to the Traditional Red Team. However it addresses a major concern that clients have and that is that they are vulnerable for the whole duration of the Red Team i.e. 6 to 12 months.
Therefore during a CRT engagement, we report back on what we found each month. This allows you to show continuous improvement and ensure that other attackers can't use the same vulnerability to compromise your organisation. CRT goes great with Advisory!
This will give you a dedicated consultant each month to run feedback sessions, explain the findings, retest, assist with remediation and transfer skills.
Social Engineering
Social Engineering is one of the oldest and best known attack methods i.e. people have been deceiving and manipulating other people for thousands of years. We adapt these traditional techniques for today's world. Social Engineering is a great way to see how aware your organisation is about these techniques and how susceptible they are to them.
Read more...
Unfortunately, many times people are the weakest link in your security thus this service is a great way to test and educate your users. Some of the techniques we use:
Our daily, weekly or monthly vulnerability assessments are an extremely cost effective way to identify and report on security issues contained in websites, applications, software and/or devices that could potentially be subject to exploitation.
This will allow you to close issues pre-production. It is always better to be proactive about security, as opposed to reactive. Download our Managed Vulnerability Service (MVS) brochure here.
MVS uses a number of well known and private tools to provide you with a list of vulnerabilities and security weaknesses found across your network perimeter or internally.
MVS scans for the following types of issues: