Light
Powerful
Rapid

software solutions

Digital

L

Light

Software does not need to be complicated. We only build what you really need, adapting the technologies to your comfort. You will not get lost with us.

  • Tailored solutions
  • Intuitive operation
P

Powerful

Let us help you explore the power of automation. Process more orders, handle more customers or create more products with little effort.

  • Automatized tasks
  • Complex computations
R

Rapid

Computers are faster than humans. Delegate your routine labor to machines and spend more time with your family and friends.

  • Quick routine processes
  • More time for analysis

What We Do

We bring modern technologies to small customers

Software Development

Analyze the processes

We will help you investigate your bussiness processes and identify the inefficient manual tasks which could be automatized to enhance your performance.

Implement a solution

Choosing the right technologies carefully, we will create software tools to simplify and smooth your day to day work routine.

Fine-tune the details

No real system can be perferct. However, we will listen to your requirements and ideas transforming them into continuous modifications to acheive seamless experience.

Web-based systems

When developing web-based applications and information systems, we mostly use object-oriented PHP frameworks (Laravel, Symphony). Front-end languages like HTML 5 and CSS 3 in combination with client-side JavaScript code are applied as a matter of cause.

However, the choice of any concrete technology is always directed by the nature of the problem being solved, for example NodeJS as a suitable tool for the tasks requiring parallelism.

Highly optimized applications

We utilize our experience with programming in native languages (C/C++) mainly when developing some specific applications or components, where the computation speed and efficiency is essential.

Automation scripts or utilities

The process of automation involves employing algorithms to take the burden of some manual routine labor. A very short program is often able to click a button, fill a form or rewrite some values instead of you.

We are trying to use a wide range of available methods - Bash, PowerShell and especially Python, semiautomatic web browser extensions or a programmable web browser Selenium.

Mobile applications

A mobile application is a common extension of an existing system, as it may be more comfortable for the users. Even though the mobile development is not our primary domain, in cooperation with our verified external co-workers we are able to deliver applications for both the Android and iOS operating systems.

Whenever a problem occurs which we cannot solve, we keep looking for some new ways and methods to proceed. Therefore, we are happy to participate on projects where we can learn som new experience. If we are not experts in a particular field, we adapt the resulting price of work to acheive mututal benefit.

Cyber Security

Penetration tests

To evaluate the security of your systems we simulate activities of a potential attacker using some automated scanners, manual analysis and some specific custom scripts.

Suspicious files analysis

In case of a real attack, we can help you explore any suspicious and potentially dangerous files, estimate the possible impact on the whole system and suggest an elimination procedure.

Consulting

We will advise you how to remediate a particular vulnerability, which option to choose when designing a new system or how to defend against some concrete threats.

Penetration tests of web applications

The most common penetration test target we encounter is a web aplication. We follow the OWASP methodology when performing the tests, while using many commercial as well as open-source tools.

Apart from automatized scanning, we take a detailed manual approach in order to discover some less obvious vulnerabilities during the penetration tests.

We use our experience from the past projects, including the penetration tests of some large information systems in various fields (banking, insurance, energetics, etc.) built on various technologies (PHP, Java, .NET, Python, NodeJS, etc.)

Penetration tests of API

Another common target of the simulated attacks are application interfaces (API) - usually REST, SOAP, or possibly some non-stanard tailored protocols.

When testing APIs, we often create our own specialized scripts in order to verify a large number of possible attack scenarios efficiently.

Experience with standard authentication protocols (OAuth2, OpenID, ...) as well as with some complex APIs from the past projects (e.g. PSD2 banking interfaces) help us perform detailed testing with reliable results.

Consulting

For each vulnerability discovered during a penetration test, we provide a recommended remediation procedure. We are always open for a discussion and will gladly share our knowledge and experience regarding concrete issues or cyber security principles in general.

Penetration tests of infrastructure

When testing the infrastructure of a company, we use some automatized scanners to discover any potential security issues, while the collected findings are manually reviewed and verified afterwards.

Internal infrastructure penetration tests often include security assessment of the company Active Directory domain, which can discover possible ways of getting unauthorized access to the domain administrator account and some sensitive data of the company.

Reverse engineering

Reverse engineering is the process of exploring a complete product in order to discover some details about its internal operation.

We employ some reverse engineering methods for example when analysing some suspicious files which might be dangerous (malware).

Apart from that, these methods can be used to examine a program or a device and discover some hidden malicious functionalities or possible backdoords.

When reverse engineering some software, we use many specialized tools, for example binwalk, radare2, IDA Pro, etc.

Penetration tests of cloud technologies

With fast adoption of cloud technologies, a greate emphasis should be put on the security of these systems.

We will help you evaluate the security of the deployed containers (Docker) and the common orchestration platforms (Kubernetes and OpenShift). We have several attack scenarios prepared for testing these systems based on your needs.

Whenever a problem occurs which we cannot solve, we keep looking for some new ways and methods to proceed. Therefore, we are happy to participate on projects where we can learn som new experience. If we are not experts in a particular field, we adapt the resulting price of work to acheive mututal benefit.

Image

About Us

LPR Solutions is a small company from East Slovakia, which freely unites several programmers and security specialists. Our mission is to create useful solutions and to bring modern technologies to smaller customers.

Your happiness is our success.

Reviews

Contact

Address

LPR Solutions s. r. o.
Janov 63
082 42, Bzenov
Slovak Republic

Phone

+421 907 174 647

Email

contact@lprsol.sk