Skip to content
  • Home
  • Services
    • Cyber Security
    • Managed Services
    • Infrastructure Security
    • Network Security
    • Red team/Attack simulation
    • Training
    • IT Consulting
    • Cloud Security
    • Virtual CISO/CTO
  • Solutions
    • Remote Office
    • Hybrid Workspace
    • SD-WAN
    • Zero Trust
    • Secure Remote access
  • Industries
    • Banking
    • Fin-Tech
    • Travel & Leisure
    • Retail
    • Oil & Gas
    • Energy
    • Startups
  • Case Studies
  • Contact Us

Services
  • Cyber Security
  • Managed Services
  • Infrastructure Security
  • Network Security
  • Red team/Attack simulation
  • Training
  • IT Consulting
  • Cloud Security
  • Virtual CISO/CTO
Solutions
  • Remote Office
  • Hybrid Workspace
  • SD-WAN
  • Zero Trust
  • Secure Remote access
Industries
  • Banking
  • Fin-Tech
  • Travel & Leisure
  • Retail
  • Oil & Gas
  • Energy
  • Startups
Links
  • Blog
  • Careers
  • Case Studies
  • Events
  • Contact Us
Copyright © 2021. All Rights Reserved
Linkedin Facebook-f
  • Privacy Policy

Vagari.ai LLC has created a Vehicle Rental App for Auto Dealers, Fleet and other vehicle owners (Owners) to provide vehicles to drivers including those who drive for uber/lyft (Renters) in the rideshare and Transportation as a Service (TaaS) industry. Vagari.ai LLC is a frictionless mobility technology startup based in New York, USA. Their first product is the vehicle rental mobile app. This App offers an opportunity for Owners to earn incremental revenue on idle inventory on one hand and for the Renters to use vehicles at subscription price and if needed be able to purchase it over a period of time.

IT and Cyber Security Challenges faced by Vagari

Some of the vulnerabilities pop out during our pentest in vagari are

  • Insecure data storage
  • Insufficient cryptography
  • Attribute uses Cleartext Traffic set
  • Task Hijacking
  • Untrusted External Storage File Access
  • Information leakage were also detected

How we remediate

We pinpoint potential avenues of network attack where access might be gained through internet-connected servers or network equipment by individuals outside of Vagari which lack appropriate rights or credentials.

We then conducted a mock attack to test security controls, developing and presenting with a cybersecurity assessment on findings along with solutions and recommendations that vagari can use to remediate the issue.

  • We start by performing reconnaissance over the span of several days to assess potential vulnerabilities from all angles.
  • Next, we put ourselves in potential attackers’ shoes to determine overall risk and valuation.
  • Based on what we know about current capabilities, strategies, techniques, and tools, we documented digital assets that are at risk.
  • We then prioritize that risk based on the net asset value were a loss event to occur.
  • To put our findings to the test, we simulate ethical hacking attacks that are primarily focused on high value target assets.
  • Those tests are customized to align with vagaris environment, vulnerabilities, and technologies.
  • Findings are prioritized and compiled into our recommendations to help them focus resources on areas that could mitigate the greatest potential loss.

Trusted Hands Financial Services Private limited is a Kerala based Activities auxiliary to financial intermediation company. A consumer-focused financial services & tech platform that solves problem of discovery, shortlisting, application, management and servicing of bank loans, borrowing options. Trusted Hands Financial Services (THFS) will change the way customers take and manage loans. THFS will enable customers to acquire their financial freedom, with right choice at the right time.

Cyber Security Challenges

Requirement : Internal / External Pentesting, Vulnerability Assesmement, Solution

The Customer needed to test the security controls deployed within their IT infrastructure.

  • Vulnerability assessment and penetration testing of the network’s external perimeter.
  • Vulnerability assessment and penetration testing of the network’s internal environment (servers, firewalls, etc.).
  • Security risk assessment of the client digital channels (internet banking, mobile banking, mPOS merchant service, QR code payments, clients’ payments, and communication in social networks).
  • Simulation of social engineering attacks at the employees’ emails to check their susceptibility to phishing.

Solutions

Offenselogic team conducted black box penetration testing of the external perimeter of the Customer’s network. The ethical hackers didn’t manage to penetrate the network with no credentials, so they proceeded with the grey box testing method using user login details but having no access to the entire network. Grey box penetration testing revealed a vulnerability of the Customer’s remote server to external manipulations.

Our security engineers scanned the Customer’s internal network for vulnerabilities and exploited the discovered vulnerabilities using the grey box penetration testing method. They discovered a server using the obsolete HTTPS protocol, which was critical for the banking environment storing clients’ data.

The Customer received detailed reports of the conducted network vulnerability assessment, penetration testing, and the security risk assessment of the client digital channels with recommendations to mitigate the discovered vulnerabilities. After fixing all the issues according to the provided remediation plan, the Customer ran retesting, which showed the increased security level of the network’s external perimeter and internal environment.

Get Connected
Your Name*