A web application penetration test analyses the security posture of web-based applications by reproducing steps that an attacker would take to break into and manipulate the software or the systems on which the application resides.
Not only do we find the usual application security vulnerabilities such as code injection and privilege escalation issues, but our methods also recognise any weaknesses specific to your custom software, including business logic flaws.
Our team relay the findings in the context of your web application, and the final report presents all the issues and recommendations in a clear, understandable and logical way.
It is vital that our analysts understand the full functionality of your website or web application in order to comprehensively test it. This stage involves browsing the application, reviewing user manuals and, if necessary, a walkthrough of the application with your developers.
In this step our analysts identify any misconfigurations in the firewall settings which may lead to an increased attack surface. TCP, ICMP and UDP protocols will also be tested during this phase of the web application penetration test.
No web application security test is complete without a thorough assessment of its supporting infrastructure.
Our penetration testers use an extensive range of tools to assess the hosting infrastructure and ensure the correct enforcement of security policies; including password policies, patch management and server hardening.
In this final phase of the web application security assessment, we analyse the application to uncover the posture of the elements such as; access control, authentication, session management, data validation and more.
We combine automated testing to discover all the known vulnerabilities and manual testing using experienced specialists to uncover previously unknown (zero day) flaws. Amongst others, we test against the OWASP (Open Web Application Security Project) TOP 10 vulnerabilities.
You are provided with a detailed report of your test results. Vulnerabilities are detailed with a description, risk level, enumeration details and vulnerability IDs such as CVE –ID, Bugtraq-ID. Most importantly we provide clear recommendations for mitigation.
We'll schedule a preliminary phone call to learn about your challenges
You'll outline your needs and highlight any relevant applications in a scoping questionnaire
We'll review the results and send a detailed proposal outlining the service and pricing
You'll let us know when to proceed
We'll schedule a convenient start date and begin gathering the required technical information in advance
The application testing phase should have little to no impact on the functionality and user experience of the site. If potential Denial of Service vulnerabilities or memory-based overflow situations are identified which could cause application components to be rendered inoperable or non-performant, the technical contact will be informed and an appropriate operational window identified for further testing (e.g. system quiet times).
It is highly likely that we have tested web sites and services similar to your own. We have tested thousands of applications for organisations from a range of sectors including:
Or…Shouldn't you be able to find all this information for yourself and identify our systems and their vulnerabilities?
We conduct ethical hacking exercises. This means we are bound by law, ethics and a code of conduct from our industry body (CREST). We therefore do not carry out certain activities that hackers would. Providing this information also allows us to provide a comprehensive test in a shorter time-frame resulting in an affordable test for you.
Time is a less critical factor for a cyber criminal. Attackers will often take months or even years to prepare for an attack on an organisation. A real-life hacker would spend a considerable length of time performing reconnaissance to gain access to sensitive information about your people, processes and systems.
Instead we start the simulation from the point at which your adversary has already gained a foothold in your system.
Attacks or tests will be primarily focused on the application and the hosting server i.e webserver, and any other services exposed on that server.
Bespoke security testing
Our Security Testing Programmes help clients identify and mitigate against the vulnerabilities within their infrastructure, processes and people. We design and conduct rigorous investigative engagements that locate and fortify weaknesses within technology, code and human behaviour.
We offer a broad range of standalone and managed security testing services, as part of both point-in-time projects and ongoing, integrated programmes.