The Penetration Testing Execution Standard Documentation Release 1.1

Total Page:16

File Type:pdf, Size:1020Kb

The Penetration Testing Execution Standard Documentation Release 1.1 The Penetration Testing Execution Standard Documentation Release 1.1 The PTES Team Jun 16, 2021 Contents 1 The Penetration Testing Execution Standard3 1.1 High Level Organization of the Standard................................3 2 Pre-engagement Interactions5 2.1 Overview.................................................5 2.2 Introduction to Scope..........................................5 2.3 Metrics for Time Estimation.......................................6 2.4 Scoping Meeting.............................................6 2.5 Additional Support Based on Hourly Rate................................7 2.6 Questionnaires..............................................7 2.7 General Questions............................................7 2.8 Scope Creep............................................... 10 2.9 Specify Start and End Dates....................................... 10 2.10 Specify IP Ranges and Domains..................................... 11 2.11 Dealing with Third Parties........................................ 11 2.12 Define Acceptable Social Engineering Pretexts............................. 12 2.13 DoS Testing............................................... 12 2.14 Payment Terms.............................................. 12 2.15 Goals................................................... 13 2.16 Establish Lines of Communication................................... 14 2.17 Emergency Contact Information..................................... 14 2.18 Rules of Engagement........................................... 15 2.19 Capabilities and Technology in Place.................................. 17 3 Intelligence Gathering 19 3.1 General.................................................. 19 3.2 Intelligence Gathering.......................................... 20 3.3 Target Selection............................................. 20 3.4 OSINT.................................................. 21 3.5 Covert Gathering............................................. 30 3.6 Footprinting............................................... 31 3.7 Identify Protection Mechanisms..................................... 35 4 Threat Modeling 37 4.1 General.................................................. 37 4.2 Business Asset Analysis......................................... 38 4.3 Business Process Analysis........................................ 41 i 4.4 Threat Agents/Community Analysis................................... 41 4.5 Threat Capability Analysis........................................ 42 4.6 Motivation Modeling........................................... 43 4.7 Finding relevant news of comparable Organizations being compromised................ 43 5 Vulnerability Analysis 45 5.1 Testing.................................................. 45 5.2 Active................................................... 45 5.3 Passive.................................................. 49 5.4 Validation................................................. 49 5.5 Research................................................. 51 6 Exploitation 53 6.1 Purpose.................................................. 53 6.2 Countermeasures............................................. 53 6.3 Evasion.................................................. 55 6.4 Precision Strike.............................................. 55 6.5 Customized Exploitation Avenue.................................... 55 6.6 Tailored Exploits............................................. 56 6.7 Zero-Day Angle............................................. 56 6.8 Example Avenues of Attack....................................... 58 6.9 Overall Objective............................................. 58 7 Post Exploitation 59 7.1 Purpose.................................................. 59 7.2 Rules of Engagement........................................... 59 7.3 Infrastructure Analysis.......................................... 61 7.4 Pillaging................................................. 63 7.5 High Value/Profile Targets........................................ 70 7.6 Data Exfiltration............................................. 70 7.7 Persistence................................................ 71 7.8 Further Penetration Into Infrastructure.................................. 71 7.9 Cleanup.................................................. 72 8 Reporting 73 8.1 Overview................................................. 73 8.2 Report Structure............................................. 73 8.3 The Executive Summary......................................... 73 8.4 Technical Report............................................. 75 9 PTES Technical Guidelines 79 9.1 Tools Required.............................................. 79 9.2 Intelligence Gathering.......................................... 82 9.3 Vulnerability Analysis.......................................... 129 9.4 Exploitation............................................... 152 9.5 Post Exploitation............................................. 178 9.6 Reporting................................................. 185 9.7 Custom tools developed......................................... 188 9.8 General.................................................. 188 9.9 Plugins.................................................. 189 9.10 Credentials................................................ 189 9.11 Target Selection............................................. 189 9.12 Access Rules............................................... 189 9.13 Preferences................................................ 189 9.14 Knowledge Base............................................. 190 ii 9.15 General.................................................. 190 9.16 Credentials................................................ 191 9.17 Plugins.................................................. 192 9.18 Preferences................................................ 192 9.19 General.................................................. 197 9.20 Credentials................................................ 198 9.21 Plugins.................................................. 199 9.22 Preferences................................................ 199 9.23 General.................................................. 203 9.24 Credentials................................................ 204 9.25 Plugins.................................................. 205 9.26 Preferences................................................ 205 9.27 Denial of service............................................. 210 9.28 Discovery scan.............................................. 210 9.29 Discovery scan (aggressive)....................................... 211 9.30 Exhaustive................................................ 212 9.31 Full audit................................................. 212 9.32 HIPAA compliance............................................ 213 9.33 Internet DMZ audit............................................ 213 9.34 Linux RPMs............................................... 214 9.35 Microsoft hotfix............................................. 214 9.36 Payment Card Industry (PCI) audit................................... 215 9.37 Penetration test.............................................. 216 9.38 Penetration test.............................................. 216 9.39 Safe network audit............................................ 217 9.40 Sarbanes-Oxley (SOX) compliance................................... 217 9.41 SCADA audit............................................... 218 9.42 Web audit................................................. 218 10 FAQ 221 10.1 Q: What is this “Penetration Testing Execution Standard”?....................... 221 10.2 Q: Who is involved with this standard?................................. 221 10.3 Q: So is this a closed group or can I join in?............................... 222 10.4 Q: Is this going to be a formal standard?................................ 222 10.5 Q: Is the standard going to include all possible pentest scenarios?................... 222 10.6 Q: Is this effort going to standardize the reporting as well?....................... 222 10.7 Q: Who is the intended audience for this standard/project?....................... 222 10.8 Q: Is there a mindmap version of the original sections?......................... 223 11 Media 225 12 Indices and tables 227 iii iv The Penetration Testing Execution Standard Documentation, Release 1.1 Contents: Contents 1 The Penetration Testing Execution Standard Documentation, Release 1.1 2 Contents CHAPTER 1 The Penetration Testing Execution Standard 1.1 High Level Organization of the Standard Fork Disclaimer: Note that this is an unofficial fork, the goal for which is to experiment with an alternative platform for the standard. The official PTES can be located at http://pentest-standard.org/. The penetration testing execution standard consists of seven (7) main sections. These cover everything related to a penetration test - from the initial communication and reasoning behind a pentest, through the intelligence gathering and threat modeling phases where testers are working behind the scenes in order to get a better understanding of the tested organization, through vulnerability research, exploitation and post exploitation, where the technical security expertise of the testers come to play and combine with the business understanding of the engagement, and finally to the reporting, which captures the entire process, in a manner that makes sense to the customer and provides the most value to it. This version can be considered a v1.0 as the core elements of the standard are solidified, and
Recommended publications
  • 1616580050.Pdf
    СОДЕРЖАНИЕ СОДЕРЖАНИЕ СОДЕРЖАНИЕ 2 ВВЕДЕНИЕ 3 СОЦИАЛЬНЫЕ МЕДИА НА ВЫБОРАХ: НАЧАЛО ДЛИННОГО ПУТИ 4 Становление политических интернет-технологий 1996–2016 4 2016: интернет побеждает телевизор. Феномен Дональда Трампа 5 ПОЛОЖЕНИЕ СОЦИАЛЬНЫХ МЕДИА К СТАРТУ КАМПАНИИ-2020 8 ИСПОЛЬЗОВАНИЕ НОВЫХ ИНСТРУМЕНТОВ В ХОДЕ ПРЕЗИДЕНТСКОЙ ГОНКИ 10 Цифровая стратегия демократов на выборах-2020. «Барометр» 10 Цифровая стратегия Трампа на выборах-2020. Роботизация таргетинга 14 Полевая работа в условиях эпидемии 18 Растущая популярность мобильных приложений 19 Фандрайзинг 22 Предвыборный дискурс и цензура 25 TikTok. Фактор новых соцмедиа в политической агитации 27 КЛЮЧЕВЫЕ ВЫВОДЫ 31 СПИСОК ИСТОЧНИКОВ 32 2 ВВЕДЕНИЕ ВВЕДЕНИЕ Выборы 2020 года в США прошли в самых не- В этом докладе не ставится цель проследить обычных условиях из всех возможных – на фоне хронологию президентской гонки в США и не вы- глобальной пандемии, самого тяжёлого экономи- сказываются оценочные суждения о результатах ческого кризиса за более чем 80 лет и наиболее прошедших выборов. Он посвящён анализу того массовых уличных протестов за последние 50 лет. инструментария, что использовался в ходе пред- Политтехнологам приходится на ходу подстра- выборной борьбы. иваться под эти неожиданные обстоятельства, В самом ближайшем будущем эти технологии адаптируясь к новой реальности. Уже давно про- станут активно использоваться во всём мире. Сле- должающаяся цифровизация современной поли- дует внимательно изучить цифровые тренды в тики лишь ускорилась. планировании и проведении предвыборных кам- На фоне кризиса традиционных медиа и соцсе- паний, агитации, полевой работы и уличной ак- тей появляются альтернативные площадки, на- тивности, которые на деле показали себя в США. бирающие стремительную популярность. Пред- выборная активность уходит в онлайн, где проще и дешевле проводить виртуальные митинги, со- брания сторонников и заниматься мобилизацией избирателей.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Indian Entertainment and Media Outlook 2010 2 Indian Entertainment and Media Outlook 2010 Message
    Indian entertainment and media outlook 2010 2 Indian entertainment and media outlook 2010 Message To our clients and friends both in and beyond the entertainment and media industry : Welcome to the 2010 edition of PricewaterhouseCoopers’ Indian Entertainment and Media (E&M) Outlook, covering the forecast period of 2010–2014. Our forecasts and analysis for this edition focus on eight major E&M industry segments and one emerging segment. Each segment details out the key trends observed and challenges faced apart from providing the prospects for the segment. In the industry overview section, we have highlighted the key theme observed during 2009 and what we perceive as future trends in the coming years. We have a chapter on the tax and regulatory impact on the various E&M segments and for the very first time we have included a chapter on how technology can be leveraged in the E&M industry. In 2009, the economy severely impacted the world, translating into steep declines in advertisement as well as consumer spending. India though impacted, did manage to show growth with increased consumer spending as well as innovative action on the part of the industry. Against this backdrop, across the world, except certain markets, speed of digital spending increased due to changing consumer behavior as well as technology available to deliver the same. In India, while the spend on digital media is likely to grow, it is unlikely that it will dominate in the forecast period. This is largely due to the relative unavailability as well as unaffordability of the broadband and mobile infrastructure.
    [Show full text]
  • Obama and the Power of Social Media and Technology
    The European Business Review Obama and the power of social media and technology This case was prepared by Victoria Chang under the supervision mobile and SMS subscribers. On Election Day alone, supporters received three texts of Professor Jennifer Aaker as the basis for class discussion rather (Exhibit 2).4 than to illustrate either effective or ineffective handling of an The campaign’s social network, www. my.barackobama.com (MyBO), allowed indi- administrative situation. Contributors included Joe Rospars, viduals to connect to one another and acti- vate themselves on behalf of the campaign. Chris Hughes, Sam Graham-Felsen, Kate Albright-Hanna, Scott Two million profiles were created. Registered Goodstein, Steve Grove, Randi Zuckerberg, Chloe Sladden and users and volunteers planned over 200,000 offline events, wrote 400,000 blog posts, and Brittany Bohnet. created 35,000 volunteer groups. Obama raised $639 million from 3 million donors, mostly through the Internet.5 Volunteers n early 2007, Barack Obama was a ers on Twitter, more than 23 times those of on MyBO generated $30 million on 70,000 little-known senator running for presi- McCain. Fifty million viewers spent 14 million personal fundraising pages.6 Donors made dent against Democratic nominee and hours watching campaign-related videos on 6.5 million donations online, totaling more Ihousehold name, Hilary Clinton. But on No- YouTube, four times McCain’s viewers.3 The than $500 million. Of those donations, 6 vember 4, 2008, Obama, 47, was the first Afri- campaign sent out 1 billion e-mails, includ- million were in increments of $100 or less, can American to win the election against Re- ing 10,000 unique messages targeted at spe- the average being $80.
    [Show full text]
  • Opera Software the Best Browsing Experience on Any Device
    Opera Software The best browsing experience on any device The best Internet experience on any device Web Standards for the Future – Bruce Lawson, Opera.com • Web Evangelist, Opera • Tech lead, Law Society & Solicitors Regulation Authority (2004-8) • Author 2 books on Web Standards, edited 2 • Committee member for British Standards Institution (BSI) for the new standard for accessible websites • Member of Web Standards Project: Accessibility Task Force • Member of W3C Mobile Best Practices Working Group Web Standards for the Future – Bruce Lawson, Opera.com B.A., Honours English Literature and Language with Drama Theresa is blind But she can use the Web if made with standards The big picture WWW The big picture Western Western Web A web (pre)history • 1989 TBL proposes a project • 1992 <img> in Mosaic beta. Now 99.57% (MAMA) • 1994 W3C started at MIT • 1996 The Browser Wars • 1999 WAP, Web Content Accessibility Guidelines (WCAG) • 2000 Flash Modern web history • 2000-ish .com Crash - Time to grow up... • 2002 Opera Mobile with Small Screen Rendering • 2005 WHAT-WG founded, W3C Mobile Web Initiative starts • 2007 W3C adopts WHAT-WG spec as basis for HTML 5 • January 22, 2008 First public working draft of HTML 5 Standards at Opera • 25 employees work on standards • Mostly at W3C - a big player • Working on many standards • Bringing new work to W3C • Implementing Standards properly (us and you!) (Web Standards Curriculum www.opera.com/wsc) Why standards? The Web works everywhere - The Web is the platform • Good standards help developers: validate; separate content and presentation - means specialisation and maintainability.
    [Show full text]
  • Applications Log Viewer
    4/1/2017 Sophos Applications Log Viewer MONITOR & ANALYZE Control Center Application List Application Filter Traffic Shaping Default Current Activities Reports Diagnostics Name * Mike App Filter PROTECT Description Based on Block filter avoidance apps Firewall Intrusion Prevention Web Enable Micro App Discovery Applications Wireless Email Web Server Advanced Threat CONFIGURE Application Application Filter Criteria Schedule Action VPN Network Category = Infrastructure, Netw... Routing Risk = 1-Very Low, 2- FTPS-Data, FTP-DataTransfer, FTP-Control, FTP Delete Request, FTP Upload Request, FTP Base, Low, 4... All the Allow Authentication FTPS, FTP Download Request Characteristics = Prone Time to misuse, Tra... System Services Technology = Client Server, Netwo... SYSTEM Profiles Category = File Transfer, Hosts and Services Confe... Risk = 3-Medium Administration All the TeamViewer Conferencing, TeamViewer FileTransfer Characteristics = Time Allow Excessive Bandwidth,... Backup & Firmware Technology = Client Server Certificates Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#71826 1/4 4/1/2017 Sophos Application Application Filter Criteria Schedule Action Applications Log Viewer Facebook Applications, Docstoc Website, Facebook Plugin, MySpace Website, MySpace.cn Website, Twitter Website, Facebook Website, Bebo Website, Classmates Website, LinkedIN Compose Webmail, Digg Web Login, Flickr Website, Flickr Web Upload, Friendfeed Web Login, MONITOR & ANALYZE Hootsuite Web Login, Friendster Web Login, Hi5 Website, Facebook Video
    [Show full text]
  • Social Network for Gamers Helps Friends Play 22 July 2009, by BARBARA ORTUTAY , AP Technology Writer
    Social network for gamers helps friends play 22 July 2009, By BARBARA ORTUTAY , AP Technology Writer (AP) -- Raptr, a social network targeting gamers, is Raptr and the game companies, THQ Inc. and hoping to make it easier to see what your friends Activision Blizzard Inc. are currently playing on a broad range of platforms such as the Xbox 360 and personal computers. Raptr isn't the first gaming venture for Fong, a former professional video gaming champion. In And if you want, you can join them in the action. 2006, he sold Xfire to Viacom Inc. for $102 million. Incidentally, Xfire is similar to Raptr in that it helps On Wednesday, Raptr launched new software that gamers keep track of people playing PC games, integrates various instant-messaging services, as but it's targeted at hardcore gamers who play titles well as Twitter and Facebook, and automatically like "World of Warcraft," "Counter-Strike" and "Call updates users' status with the games they are of Duty 4: Modern Warfare." currently playing. ©2009 The Associated Press. All rights reserved. It recognizes about 32,000 games, including This material may not be published, broadcast, hardcore titles like "Halo 3," music games like rewritten or redistributed. "Guitar Hero" and social games such as Zynga's "YoVille" on Facebook. And if your friend is in the midst of a multiplayer game, you can join in, provided you've installed Raptr on your computer, for free. "Most people prefer to play with friends, ... but finding friends and playing with them is hard," CEO and founder Dennis Fong said.
    [Show full text]
  • IT Social Media Toolkit: a Practical Guide to Achieving Benefits
    Social Media Toolkit: a practical guide to achieving benefits and managing risks TOOLKIT UCISA Foreword This Toolkit stems from growing interest in the use of social media within the UCISA community. With institutional stakeholders looking increasingly to their information services departments for support in this area, our members sought a reference guide to help them answer a range of questions on related topics. More than that, however, they were seeking practical, contextual examples of use that would inspire others within their institution to take advantage of the affordances of a set of tools that offer new forms of engagement and ways to enhance many aspects of everyday business practice. We would like to thank the numerous UCISA colleagues, and others within the wider higher education community, who have contributed to the production of this Toolkit by providing examples and reviewing content. We hope the examples given here will encourage many more of you to try new approaches to supporting core university functions via social media tools. Adrian Ellison, Director of IT, University of West London UCISA Executive Committee Secretary Universities and Colleges Information Systems Association University of Oxford 13 Banbury Road Oxford OX2 6NN Tel: +44 (0)1865 283425 Fax: +44 (0)1865 283426 Email: [email protected] www.ucisa.ac.uk UCISA SOCIAL MEDIA TOOLKIT 2 Contents Foreword 2 Executive summary 5 Why should we be interested? 5 What are the benefits? 5 What are the risks? 6 Who needs to read this? 6 1 Purpose of this Toolkit 7 2
    [Show full text]
  • Big Data for Measuring the Information Society
    BIG DATA FOR MEASURING THE INFORMATION SOCIETY COUNTRY REPORT SWEDEN 1 / 44 Acknowledgments: The big data analysis contained in this report was carried out by Ivan Vallejo Vall, Market Analyst at the ICT Data and Statistics Division within the Telecommunication Development Bureau of ITU. Fredrik Eriksson, Statistician in the same division, made substantial contributions to the analysis. The Internet Foundation in Sweden (IIS) provided the data used in this report, as well as insightful information on the methodology of the data collection. IIS’s cooperation is duly acknowledged. 2 / 44 CONTENTS Contents ........................................................................................................................................................ 3 1. Background and Context ........................................................................................................................... 4 1.1. Project Description ............................................................................................................................. 4 1.2. Pilot Country Context ......................................................................................................................... 4 1.3. Stakeholders in the pilot and project timeline .................................................................................. 6 2. Getting Access to the Data: Procedures, Legal Documents and Challenges ............................................ 7 2.1. Legal Documents and Challenges .....................................................................................................
    [Show full text]
  • 22.Format Hum-SOCIAL NETWORKING and LIBRARIES
    IMPACT: International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL) ISSN (P): 2347-4564; ISSN (E): 2321-8878 Vol. 5, Issue 10, Oct 2017, 165-170 © Impact Journals SOCIAL NETWORKING AND LIBRARIES SHEEL BHADRA YADAV, MOHIT GUPTA & APARNA DIXIT Research Scholar, Guest Faculty, Department of Library and Information science, Bundelkhand University, Jhansi, India ABSTRACT In this era of information technology, users are more progressive and like to use advances in information technology, for getting updated with world and also, to fulfil their academic and social need. This paper deals with the concepts of the social networking in libraries. Paper focuses on challenges of social networking among library professionals, the paper highlights purpose of social media, example of social networking sites. The study shows us that social networking sites are an integral part of our life. The paper also shows popularity of social networking sites among users through statistical Social Media. KEYWORDS : Library 2.0, Social Networking Sites, Web 2.0 INTRODUCTION Social networking plays an important and effective role for communication. There are many social networking sites such as MySpace, Friendster, Facebook, Digg, hi5, Haboo, LinkedIn, Netlog, YouTube, Wikipedia, Flickr, Pinterest, Twitter, Instagram, etc. are used for the purpose of communication. Social networking encompasses many software, which helps software users to interact and share their information. Social networking creates a platform, by which similar interest of users stand on single platform. In the end of 1990s, various social networking sites were developed with attractive features. Friendsters develop in 2002. Friendster had amazing features compared to to others of those days.
    [Show full text]
  • Massanimaldeathunknow N 2 0 1 1
    Copernic Agent Search Results Search: mass animal death unknown 2011 (All the words) Found: 321 result(s) on All.Web Date: 3/27/2011 8:21:53 PM 1. Mass animal deaths in winter 2010-2011 | INFOgraphics | RIA ... Large groups of birds, fish and other animals have been found dead in different parts of the world. In many cases, the cause of death remains unknown. http://en.rian.ru/infographics/20110112/162112641.html 92% 2. Mass animal deaths: Social nonsense or scientific unknown? Jan 24, 2011 ... Are the recent reports of mass animal deaths nothing but spurious drivel? Or is there something unseen occurring? If so, what could it be, ... http://gleaner.rutgers.edu/2011/01/24/mass-animal-deaths-social-nonsense-or-scientific-unknown/ 91% 3. Sudden global death of birds & fishes! - Explore, Experience ... UPDATE: You can see the latest updates on the Mass Animal Death Database page that ... Actual Cause : Unknown Date: Jan 3, 2011 at 5:24 PM CST News. Louisiana QTY: 500 http://simontay78.com/paranormal/sudden-global-death-of-birds-fishes/ 91% 4. Mass Animal Deaths: Who is The Killer? | Scienceray Who is the killer that is responsible for each mass animal death ... However, this time the source is unknown. Let us take ... End of The World on March 31 ,2011; Ten Greatest and ... http://scienceray.com/biology/mass-animal-deaths-who-is-the-killer/ 90% 5. Mass kill of Dolphins, Manatees, Penguins, Bats, Blackbirds ... Quebec bird deaths January 2011 North Carolina US Mass Death among ... Italy, around 3 January 2011 300 doves Cause unknown at this ..
    [Show full text]
  • Padma Vibhushan Shri Dhirubhai H. Ambani (28Th December, 1932 - 6Th July, 2002) Reliance Group - Founder and Visionary Profile
    Communications Annual Report 2015-16 Padma Vibhushan Shri Dhirubhai H. Ambani (28th December, 1932 - 6th July, 2002) Reliance Group - Founder and Visionary Profile Reliance Communications Limited is the flagship Company of Reliance Group, one of the leading business houses in India. Reliance Communications is India’s foremost and truly integrated telecommunications service provider. The Company has a customer base of over 111 million including over 2.6 million individual overseas retail customers. Reliance Communications corporate clientele includes over 39,000 Indian and multinational corporations including small and medium enterprises and over 290 global, regional and domestic carriers. Reliance Communications has established a pan-India, next generation, integrated (wireless and wireline), convergent (voice, data and video) digital network that is capable of supporting best-of-class services spanning the entire communications value chain, covering over 21,000 cities and towns and over 400,000 villages. Reliance Communications owns and operates the world’s largest next generation IP enabled connectivity infrastructure, comprising over 280,000 kilometers of fibre optic cable systems in India, USA, Europe, Middle East and the Asia Pacific region. Mission: Excellence in Communication Arena To attain global best practices and become a world-class communication service provider – guided by its purpose to move towards greater degree of sophistication and maturity. To work with vigour, dedication and innovation to achieve excellence in service, quality, reliability, safety and customer care as the ultimate goal. To earn the trust and confidence of all stakeholders, exceeding their expectations and make the Company a respected household name. To consistently achieve high growth with the highest levels of productivity.
    [Show full text]