planck banner
Planck Security Lab
Established in 2015, Sunyainfo Planck Attack and Defense Laboratory has many years of practical experience in reverse analysis, attack and defense penetration, scheme consultation, security protection and emergency response, and has provided security training, security consultation, penetration testing and other services for the State Grid, the People's Bank of China, China Development Bank, JD and other governments, central enterprises and Internet companies. The key research direction of the Attack and Defense Laboratory is security attack prevention technology in cloud computing environments.
I don't expect to discover a new continent, I just hope to understand the existing physical foundations and perhaps deepen them.
——Max Planck
Security Service

Attack and Defense Business

Penetration Test

Solutions Consultation

Security Operation

  • Information and Confidentiality Security Awareness Training
  • Information Security Attack and Defense Technology Training
  • Information Security Practical Training Lab
  • Practical Experience of Information Security Equipment
  • Emergency Drill Simulation
  • Legal and Regulatory Training
  • Enhance safety awareness and popularize safety knowledge. Detailed analysis of cases of confidential technology and information security breaches; Combining technical expert explanations with anime, video, and demonstration tool systems. Assist clients in avoiding information security risks in their daily work.
  • Explanation of information security attack techniques and introduction of new product technologies under the new situation; Construction of security protection system, rectification plan for security protection, etc. Cooperate with actual attack and defense demonstrations.
  • Cultivate security operation and maintenance personnel with both offensive and defensive capabilities, including training in OWASP TOP 10 web attack techniques; Web site and server reinforcement training; Practical application of network traffic analysis; Practical experience in password cracking technology, etc.
  • Through hands-on training on information security equipment such as network gateways, firewalls, intrusion prevention, network auditing, vulnerability scanning, and database auditing, one can master the working principles of mainstream network information security devices, the specifications, functions, performance, configuration strategies, and application scenario analysis of mainstream products.
  • Server operating system intrusion control event drill, website information tampering event emergency drill, wireless WIFI phishing intrusion and mobile terminal control event drill, etc.
  • In depth interpretation and application examples of relevant laws and regulations such as Cybersecurity Law and Cybersecurity 2.0.
  • Website Penetration Testing
  • Internal Network Penetration Testing
  • Mobile APP Penetration Testing
  • Conduct remote vulnerability scanning and penetration testing on the website, and issue a testing report. The testing scope includes subdomains under the main domain name.
  • The implementation period is 5 days, and on-site vulnerability scanning and penetration testing will be conducted on user intranet sites and services. The testing scope includes subdomains under the main domain name, and a testing report will be issued.
  • Conduct penetration testing on mobile apps and issue a testing report.
  • Consultation on Safety Emergency Response Plan
  • Consultation on Compliance Plans for Waiting Insurance
  • Consultation on Private Cloud Protection Solutions
  • Tailored information security emergency response plans for clients, timely handling of various types and levels of threats, and minimizing losses. In addition to developing plans, we also provide implementation support to assist clients in implementing emergency response plans, with us providing emergency response support.
  • Assist clients in understanding the compliance requirements of the security system and develop corrective action plans tailored to the actual situation.
  • Tailored private cloud security protection solutions for customers.
  • Strategy Sorting and Optimization
  • Log Analysis and Audit
  • Based on the actual situation of the user, sort out and optimize the security devices in the user's network, eliminate security risks, and improve the effectiveness of security protection.
  • Audit and analyze the security device logs, server logs, and client logs in the user network, investigate for suspicious behavior, penetration attacks, and data leakage issues, and issue an analysis audit report.

WeChat

© 2024 Sunyainfo Technology Co., Ltd.