home

BERANDA

about

TENTANG KAMI

services

LAYANAN

others menu

MENU LAIN

close

Penetration Testing Data Center for an Infrastructure & Construction Company

An infrastructure and construction company, focused on the development and management of national strategic projects, was undergoing IT system modernization. As part of this initiative, the company managed its data center infrastructure to support critical business applications, including asset monitoring and project control systems.

Hero Data Center Pentest for an Infrastructure & Construction Company

Background & Scope

Technological advancements prompted the company to adopt various digital services for field operations and project management. The data center served as the system backbone, running services ranging from asset management portals to toll gate systems controlling field equipment. As the volume of data and connectivity with third-party systems increased, so did the risk of cyberattacks, particularly concerning data confidentiality and network access security.

Client Hutama Karya

Challenges

Sensitive Data Volume

Sensitive Data Volume

The data center stored hundreds of gigabytes of project data, including contract documents, financial reports, and field monitoring results, all requiring strict confidentiality.

Third-Party Access

Third-Party Access

The integration with vendors and partners (such as cloud service providers and toll gate systems) added complexity to access control.

Compliance & Reliability

Compliance & Reliability

The company was obligated to comply with IT security standards and ensure service availability o f≥ 99,9% without interruption due to security incidents.

Data Center Penetration Testing Solution

LOGIQUE performed a comprehensive penetration test over one week, utilizing a combination of onsite and remote testing, delivered by a CEH Master certified pentester. Two strategies were combined for maximum coverage:

Black Box Testing

Black Box Testing

Conducted without internal system information, simulating a real external attack

Gray Box Testing

Gray Box Testing

Provided with limited credential access to simulate insider threats and enable in-depth testing

Timeline of Activities

DAY 1
Onsite Testing
  • Kick-off & physical access verification to the server room – LAN topology mapping
Remote Testing
  • Network Enumeration (Nmap) – VPN connection setup
DAY 2
Onsite Testing
  • Interviews with the IT operational team – Review network segmentation diagrams
Remote Testing
  • Analysis of SSL/TLS ciphers (ssl-enum-ciphers)
DAY 3
Onsite Testing
  • Check local SSH server patch levels
Remote Testing
  • Test for Terrapin attack with packet-injection PoC
DAY 4
Onsite Testing
  • Validate SNMP configuration on switch/core router
Remote Testing
  • SNMPwalk with community "public" and test write access in an isolated lab
DAY 5
Onsite Testing
  • Mid-engagement review & discussion of initial mitigations
Remote Testing
  • Exploit SWEET32 on VPN connection and capture traffic
DAY 6
Onsite Testing
  • Verification of temporary fixes by the IT team
Remote Testing
  • Retest all attack vectors after hot-fixes were applied
DAY 7
Onsite Testing
  • Presentation of findings and remediation roadmap
Remote Testing
  • Preparation of the final report and document submission

Results Obtained

Identification of Critical Vulnerabilities

SWEET32 (CVE-2016-2183)

The use of 3DES cipher on the VPN was exposed, potentially allowing partial decryption of traffic after ~32 GB of data was recorded.

SSH Terrapin (CVE-2023-48795)

The SSH protocol was found vulnerable to downgrade negotiation, potentially weakening the encryption algorithm undetected.

SNMP “public”

The default community string allowed network configuration enumeration and potential unauthorized changes.

Mitigation Recommendations

Remove 3DES & Blowfish

Reconfigure SSL/TLS and VPN to only support AES-GCM/ChaCha20-Poly1305.

SSH Patch & Hardening

Upgrade to OpenSSH ≥ 9.6; disable CBC modes; implement ecdh-sha2 key-exchange.

Secure SNMP

Replace the default community string with a unique value; migrate to SNMPv3 with authentication and encryption; restrict access via ACL.

Security & Compliance Improvement

With the recommended remediation actions, the company was able to strengthen the confidentiality, integrity, and availability of its data center infrastructure, while simultaneously meeting both internal and external security audit requirements.

Please visit LOGIQUE's Penetration Testing Services page for further information.

Contact Us

CONTACT LOGIQUE

Is your system and web truly secure?

LOGIQUE offers world-class penetration testing services conducted by certified professionals (OSCP, CEH, etc.)—all performed in-house to ensure full confidentiality and top-quality results.

We provide clear, actionable reports, fast delivery, and tailored support. That’s why financial institutions, corporations, and government offices trust us.

Ready to get started or learn more?

Feel free to request a sample report or a tailored proposal. No obligations.