London: 020 0200 8142


13 July 2016 by Pravesh Kara

The Directors of Perspective Risk Ltd are delighted to announce the appointment of Oscar O’Connor as a Non Executive Director of the company. Industry Experience Oscar brings a wealth of experience in business leadership, marketing and service development as well as being a recognised expert on information assurance, business continuity, cyber security and programme management, designing, mobilising and managing major programmes of transformational change. He has worked across Europe, the Middle-East, North Africa and the United States, … Read More »

Category: Announcements
23 January 2016 by Matthew Byrne

The Cloud – advantages and pitfalls ‘The cloud’ is the term given to the provision of services and applications hosted on the Internet, instead of traditionally on business premises. Cloud computing gives individuals and businesses the ability to store and process their information in third-party data centres with the much advertised benefits of getting their applications up and running quickly, as well as improved manageability and reduced downtime. This enables businesses to rapidly fine-tune resources in response … Read More »

29 June 2015 by Lynda Curtis

Perspective Risk (PR) is pleased to announce it has been recognised as a highly innovative digital business by the Innovation and Enterprise Digital Fund (INV-ENT Digital). PR was chosen to receive a funding award based on an innovative digital solution in a highly competitive and over subscribed selection process.   “The new portal will provide our clients with fast, seamless access to the comprehensive range of professional services offered by PR, whilst still giving the high level of … Read More »

Category: Announcements
20 April 2015 by Pravesh Kara

Perspective Risk are a highly professional organisation. The assessment conducted went without incident. A pleasure to work with. Project: Penetration Testing

4 April 2015 by Matthew Byrne

Title: Thinfinity Remote Desktop Workstation Directory Traversal Flaw Version: Thinfinity Remote Desktop Workstation v. Vendor: Cybele Software, Inc Release Date: 01/04/2015 Want to check how good your organisation’s security is? Click here. Thinfinity vulnerability summary Thinfinity Remote Desktop Workstation was found to be vulnerable to an unauthenticated directory traversal flaw. Impact of the Thinfinity vulnerability Exploiting this flaw allows an adversary to gain unrestricted access to system resources on the affected host as the service runs in … Read More »

26 March 2015 by Pravesh Kara

Perspective Risk stand out in the field of penetration testing because they understand the importance of security risks and are able to map it to the domain in which their client is operating. Perspective Risk take penetration testing to the next level, using real people to test systems and interpret the results. Project: Mobile and Application Penetration Testing

26 March 2015 by Pravesh Kara

Matthew Byrne provided some great advice and showed great insight and knowledge about security aspects and vulnerabilities across our environment. Very pleased with his efforts and advice given throughout the engagement. Project: Pan Government Accreditation IT Health Check and Penetration Test

26 March 2015 by Pravesh Kara

Zia was our main contact and was invaluable to helping us resolve potentially show stopper issues. Project: Annual PSN IT Health Check and Penetration Test

26 March 2015 by Thomas Yarwood

Great communication with the team during testing – highly collaborative while maintaining rigorous testing criteria. The fast turnaround of the report was greatly appreciated given the tight timescales for the project.   Project: IT Health Check and Penetration Test

13 March 2015 by Pravesh Kara

With a growing web development team coding in a fast paced environment, it was important for us to get an expert third party security firm in to carry out a web security review. Perspective Risk provided the independent review we needed. Project: Application Penetration Test

13 March 2015 by Pravesh Kara

Zia Rehman came to TNA to carry out an ITHC in September and all of the staff he worked with, including myself, were really impressed with his skill and knowledge and how well he got on with everyone and how he made the whole process very straightforward whilst achieving a great deal of work. Project: IT Health Check and Penetration Test

25 September 2014 by Matthew Byrne

Overview The information security field has been lit up over the last few hours discussing “Shellshock” the next Heartbleed type vulnerability (in terms of severity), the jury is still out as to whether this is worse but it’s certainly looking to be at least as bad as Heartbleed at this stage in proceedings. In the Wild Perspective Risk has already identified scan attempts looking for the vulnerability, albeit from a security researcher conducting an assessment of the … Read More »

30 July 2014 by Dave Stroud

Following on from my first blog post, hopefully you’ve now grasped the basics of XSS, so we can move onto some slightly more advanced areas. As mentioned in the previous post, we’ll be covering event handlers today. We’re also going to take a look at breaking out of HTML tags, as this is another essential part of exploiting XSS flaws and web security!   Event Handlers Event handlers are special JavaScript functions that perform an action based … Read More »

18 September 2013 by Dave Stroud

This is a quick script I wrote for converting to Unicode and back when using string.fromCharCode() to circumvent filters in Cross Site Scripting attacks.   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 #!/usr/bin/python2.7   import argparse import sys import re   def CharCode(text):     print “<script>eval(String.fromCharCode(“,     for count, … Read More »

17 September 2013 by Dave Stroud

Following on from my MySQL Injection Practical Cheat Sheet here is the MSSQL version. As before, I will list the injections by their categories: union based, error based and inferential (time and boolean). Wherever you see @@version below (used to find the database version), you can replace it with:   db_name() – to extract database name user_name() or user()- to extract the username the database runs under @@servername – to extract the server name host_name() – to extract the host name   Note that, in the … Read More »

21 May 2013 by Finian Mackin

Kali Linux – Pentesting for the masses? My previous blog post looked at the changing face of the Backtrack / Kali rebirth and how the Offensive Security team, along with Rapid7, are looking at progressing into the Enterprise space. In this post I will be looking a bit closer at the Kali distribution itself and getting to the bottom of some of the changes and reasoning behind the move.   Progression to a more standardised approach At its core, it’s a move … Read More »

15 May 2013 by Finian Mackin

Penetration testing for the masses with Kali Kālī (Sanskrit: काली, IPA: [kɑːliː]), also known as Kālikā (Sanskrit: कालिका), is the Hindu goddess associated with empowerment, shakti. The name Kali comes from kala, which means black, time, death, lord of death, Shiva.   Interesting and a little scary on first glance, but perhaps more relevant to us, Kali Linux is the new generation of the industry-leading Backtrack Linux penetration testing and security auditing distribution. Kali Linux is a complete re-build … Read More »

23 April 2013 by Finian Mackin

Instant Penetration Testing: Setting Up a Test Lab How-to [Instant] by Vyacheslav Fadyushin, is available now from Packt Publishing at a price of £6.99 £5.94. It is aimed at the prospective or novice security consultant and will give a high level look at the penetration test process, methods and training requirements for someone to get their teeth into.   The Beginning The text starts by conveying the ethos and components of a penetration test in a logical and easy to understand fashion, … Read More »

25 March 2013 by Abdul Ikbal

NFSShell is neat little tool that allows user level access to an NFS server and its NFS shares. It can be used by penetration testers to exploit known issues with the NFS Service typically associated with the port 2049/tcp. A whole host of vulnerabilities are associated with an NFS share being exposed. The screenshot below shows several simple steps I took to view an NFS share available to mount on the host. I then used the … Read More »

25 March 2013 by Dave Stroud

There are lot of excellent SQL injection cheat sheets out there; however, I found the majority provide only the components of a SQL injection rather an entire, working string. As a result, successfully putting a valid query together can take some trial and error and waste precious time. I have thus attempted to create a list of pre-made strings for each type of SQL injection so that they can simply be pasted in with little modification.   … Read More »

We are Perspective Risk

  • Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.

    Our penetration testing, pen testing, pen tests and cyber security testing has proven time and time again to be an effective security assessment of business IT infrastructure.

    Perspective Risk provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.

  • Call Me

    Pop your details in below and we’ll be in touch soon!

    • This field is for validation purposes and should be left unchanged.

    Get Quote
    • This field is for validation purposes and should be left unchanged.