Information Technology

Penetration Testing

With the growth of electronic business transactions, organizations of all sizes must protect sensitive data and maintain regulatory compliance in their IT environment. Failure to protect critical online assets can result in financial losses and damage to your reputation.

Our penetration testing services are designed to identify systems vulnerabilities, validate existing controls and provide a roadmap for remediation. Our solution helps:
Simplify the process of identifying and prioritizing weaknesses
Reduce risks and downtime by providing specific guidance and recommendations designed to reduce exposures
Improve return on investment by helping you strengthen protection of your critical IT assets
Draw on the combined expertise of highly skilled security consultants, as well as industry-leading security assessment tools.
How it works
We offer an end-to-end penetration testing package that begins with exercises that are designed to be safe and controlled, to simulate covert and hostile attacks. Then, we provide specific guidance and recommendations for reducing risk and increasing compliance management. Listed below are examples of key features we can provide.
e-Sealed combines penetration testing with a vulnerability assessment to identify and validate threats or weaknesses that could compromise your IT security. Our IT security experts use “best-in-class” scanning tools to perform vulnerability assessments that identify the highest potential risk to your environment. We then conduct penetration testing (ethical hacking) to manually simulate real-world network attacks, mimicking the tactics employed by malicious outsiders. The result is an IT security report of findings and a detailed risk analysis with actionable recommendations to help you better protect your IT security including network infrastructure, critical systems, and confidential data.
Penetration Testing: External Networks:
Penetration testing for Internet-accessible devices and services such as web servers, firewalls, routers. DNS, remote access, etc. Our external network security risk assessment utilizes a risk-based approach to manually identify critical infrastructure security vulnerabilities that exist on all Internet-accessible services within scope.
Penetration Testing: Internal Networks:
Penetration testing for internal servers, firewalls, routers and switches, email and DNS services. Our internal network security risk assessment utilizes a risk-based approach to manually identify critical infrastructure security vulnerabilities that exist on targeted, internal systems within scope.
More on Penetration Testing:
The term “penetration testing” is often used interchangeably with “network security assessment”. In most cases though, the purpose of a penetration test is to focus on a very specific set of computer systems or networks. Penetration testing is also known as a “pen test”. An external pen test targets an organization’s external IP address space, such as publicly-facing web servers, DNS servers, e-mail servers, and firewalls. The objective of a pen test is to determine if an external hacker can infiltrate the network and then go on to gain further unauthorized access to internal systems or confidential data.

adminPenetration Testing
read more


SAMA cyber security framework published in 2017 is established to standardize information security processes and procedure in Saudi Arabian financial sector. The  adoption  and  implementation  of the Framework  is  a  vital  step  for  ensuring  that  Saudi  Arabian Banking, Insurance and Financing sector can manage and withstand cyber security threats. SAMA cyber security framework articulates appropriate controls and provide guidance on how to assess maturity level. The adoption of framework will ensure cyber security risks are managed throughout the financial sectors.

read more

WannaCry Ransomware

A virulent new strain of ransomware known as WannaCry (Ransom.Wannacry) has hit hundreds of thousands of computers worldwide since its emergence on Friday, May 12. WannaCry is far more dangerous than other common ransomware types because of its ability to spread itself across an organization’s network by exploiting critical vulnerabilities in Windows computers, which were patched by Microsoft in March 2017 (MS17-010).

The exploit, known as “Eternal Blue,” was released online in April in the latest of a series of leaks by a group known as the Shadow Brokers, who claimed that it had stolen the data from the Equation cyber espionage group.


What is a Ransomware?

Ransomware is a kind of cyber-attack that involves hackers taking control of a computer system and blocking access to it until a ransom is paid.WannaCry searches for and encrypts 176 different file types and appends .WCRY to the end of the file name. It asks users to pay a US$300 ransom in bitcoins. The ransom note indicates that the payment amount will be doubled after three days. If payment is not made after seven days it claims the encrypted files will be deleted.

Who is the victim?

Any unpatched Windows computer is potentially susceptible to WannaCry. Organizations are particularly at risk because of its ability to spread across networks and a number of organizations globally have been affected, the majority of which are in Europe. However individuals can also be affected.

Although Middle East is least affected by this ransomware until now, researchers have warned that new version of WannaCry will be more destructive.

How I can be protected?

The best protection against ransomware attacks is to have all files backed up in a completely separate system. This means that if you suffer an attack you won’t lost any information to the hackers.

It is difficult to prevent determined hackers from launching a ransomware attack, but exercising caution can help. Cyber attackers need to download the malicious software onto a computer and other connected device. The most common ways of installing the virus are through compromised emails and websites.

How e-Sealed can help?

e-Sealed security is determined to provide security services to all kinds of organizations as well as individuals. A nominal fee of SAR 100 is charged by e-sealed to scan your PC or laptop for weaknesses that can cause WannaCry to hack you. In addition other vulnerabilities will also be identified and reported. We will also fix the vulnerabilities so that you stay protected and secure. This service is available for all the residents of GCC.

For any queries and Support:

Contact:(M) +966552405739



adminWannaCry Ransomware
read more

More than 60% of Saudi Arabia Drupal websites are Vulnerable

We have discovered – at e-Sealed – that most Drupal websites in KSA are vulnerable to a very serious SQL injection attack.

More than 60% of the Drupal websites in KSA have critical security issues.

The bug was introduced in early 2011 and stayed well hidden in the core framework. It was discovered on 15th of October 2014.
E-Sealed has discovered that most (apx 62%) of the Drupal based websites in Saudi Arabia are still vulnerable to the highly critical security issue.
The vulnerability affecting all Drupal 7.x versions prior to 7.32 became public on October 15 2014 and leaves Millions of Websites Open to Hackers, This bug can be exploited remotely by non-authenticated users, and shortly after the disclosure, attackers began exploiting it using “automated attacks”. It appears that the impact/s could be quite severe – a worst case scenario is it could lead to a complete authentication bypass, or full control of and access to database contents over the Internet. According to Drupal’s own statistics, almost a million websites currently use Drupal 7.
As the initial Drupal security advisory explains, “Drupal 7 includes a database abstraction API to ensure that queries executed against the database are sanitized to prevent SQL injection attacks. A vulnerability in this API allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. Depending on the content of the requests this can lead to privilege escalation, arbitrary PHP execution, or other attacks.”
A followup advisory notes that automated attacks began compromising Drupal 7 websites within hours of the announcement of the flaw, and warned that simply updating to Drupal 7.32 will not remove backdoors. “You should proceed under the assumption that every Drupal 7 website was compromised unless updated or patched before Oct 15th, 11pm UTC, that is seven hours after the announcement,” the advisory states. “If you have not updated or applied this patch, do so immediately.”
“If you find that your site is already patched but you didn’t do it, that can be a symptom that the site was compromised — some attacks have applied the patch as a way to guarantee they are the only attacker in control of the site,” the speed with which this flaw was exploited is alarming.
In many cases, it simply wouldn’t have been possible for system administrators to update their systems in time to block any attacks. The best defense in this arms race is about protecting your properties in various ways that complement each other, While patching is important, there are other methods to defend against such attacks, for example by hardening your website against SQL injections, brute force attacks, and also by deploying a Web application firewall which can detect malicious behavior and stop them before they reach your internal applications.
E-sealed has discovered that most of the Drupal based websites in Kingdom which also includes some govt website from different sectors are still using vulnerable version of Drupal 7.0-7.31. This can result in massive level compromises of Information availability, integrity and confidentiality. You can contact E-sealed to test and restore your vulnerable site, E-sealed can help you to identify and mitigate your security risks by providing professional vulnerability analysis, penetration testing and website hardening services.

adminMore than 60% of Saudi Arabia Drupal websites are Vulnerable
read more