Web Application and Service Penetration Test
Do you trust user supplied input?
Service
Web applications and services are often exposed to the internet and can easily be attacked from all over the world. It is therefore paramount to ensure the security of those applications or services. Common issues are insufficiently sanitizing user input, vulnerabilities, and misconfigurations on the platform or in the components used, broken access control, or broken authorization between various user roles and more. A penetration test identifies currently known vulnerabilities in the system.
Value
Become aware of currently known threats in your web application or service.
The observed issues are listed based on critically to the whole system and with its effect described, allowing for the business to mitigate or accept the risk if desired.
Verify if the application or service follows best practice.
Deliverables
A penetration test report of the web application or service with executive summary and a technical section for IT staff and developers. The report documents the observed vulnerabilities and misconfigurations in the system along with recommend remediation actions.
Debriefing session where the findings are reviewed.
Methodology
Our methodology is inspired by OWASP and NIST’s publications on penetration testing. It is further developed with our knowledge of hacking and identifying attack paths in web applications and services.
We suggest the project be performed as a white-box test, and test both as an unauthenticated and authenticated attacker. As the authenticated attacker, we will test as each role within the system if applicable.
Throughout the test we use a combination of automated scans and creative manual tests based on our knowledge of hacking and web applications and services.
We assess areas such as:
Access control such as Authentication and Authorization mechanisms
Identity management
Session Management
Error handling
Use of cryptography
Input Validation and Sanitization
Flow in terms of Business Logic
Information exposure
Deployment and configuration management
Involvement
Minimal involvement is required. An initial kick-off meeting where the flow of system is explained is required, this is usually an hour or less. Additionally, a relevant resource which can explain the application should be available throughout the test.
See our other services