Professional Application Penetration Testing Services
Receive an invitation for a 30-minute video conference
Secure Your Application, Protect Your Business
Protect your web applications from the most critical security threats with our comprehensive penetration testing.
Our services are designed to identify vulnerabilities and strengthen the security of your computer systems.
Penetration Test for Small Web Applications (Blackbox) - 5 days:
Ideal for websites or web applications without user accounts. This service includes (semi-)automated scans with Burp Suite Pro and manual testing based on the OWASP methodology
Standard Penetration Test for Web App
(Greybox) - 7 days:
For a more thorough security evaluation of your web applications with authenticated parts and different privilege levels. Includes manual and (semi-)automated testing.
Advanced Penetration Test + Source Code Review (Whitebox) - 15 days:
For an in-depth security evaluation, this service includes a detailed review of your source code.
Penetration Testing & Code Audit Methodology
Conducting a source code audit is a crucial step in ensuring the protection of the web application against potential vulnerabilities and cyberattacks. Here is the method employed to accomplish this essential mission:
- The target, needs, and best-suited approach (Blackbox, Greybox, Whitebox) are jointly defined,
- A contract and a testing mandate for the specified target are established for a specific period and date,
- The penetration test is conducted following the methodologies recommended by OWASP,
- The audit report is presented during a video conference, including the details of the vulnerabilities found and the solutions to rectify them.
Delivery and Report:
Each service concludes with the delivery of a detailed PDF report (sample available upon request) which includes:
- An executive summary,
- An action plan with recommendations for remediation,
- A detailed description of each vulnerability found, proof of concept (if applicable), risk assessment, and external references (OWASP, CWE).
Presentation of Results:
An email will be sent to inform you that the audit is completed. The results and the report will be presented during a final meeting to address any potential questions. A video conference appointment will be arranged together.
Post-Correction Verification Option:
After the report delivery and the implementation of the recommendations, we offer, if you wish, the option to verify that the documented vulnerabilities have indeed been corrected.
About Your Pentest Expert
Our team is led by an expert who has worked for three years with various clients within a security consulting firm and has over ten years of experience in penetration testing within a multinational company operating in the hardware, software, and IT services sectors.
- Web application and infrastructure penetration testing (black/white box, internal/external network context), Code audits (PHP, Java, Shell...),
- Mobile application security audits (Android),
- Reverse engineering for security assessments (Windows applications),
- Vulnerability scanning (Nessus), Configuration audits and hardening (Linux, Windows servers),
- Phishing tests.
OWASP Web Application Security Testing
OWASP Web Application Security Testing' refers to a set of best practices and methodologies proposed by the Open Web Application Security Project (OWASP) for testing the security of web applications. These tests aim to identify security vulnerabilities in web applications before they can be exploited by attackers. Here is a brief explanation of each test category:
- Information Gathering: This phase involves collecting as much information as possible about the web application and its environment to better understand where and how attacks could be conducted.
- Configuration and Deployment Management Testing: This category involves testing the configuration and deployment management of the application, ensuring there are no security flaws due to poor configuration or inadequate deployment practices.
- Identity Management Testing: Tests identity management to verify that the user and role management mechanisms are secure and do not allow unauthorized actions.
- Authentication Testing: Verifies that the authentication system is robust, ensuring that only authenticated users can access restricted resources.
- Authorization Testing: Examines access controls to ensure that users can only access the resources for which they have rights, and nothing more.
- Session Management Testing: Tests session management to ensure that user sessions are securely managed, preventing hijackings or other abuses.
- Input Validation Testing: Checks that the application correctly validates user inputs to prevent SQL injections, cross-site scripting (XSS), and other vulnerabilities based on malicious inputs.
- Testing for Error Handling: Evaluates how the application handles errors to prevent the disclosure of sensitive information through error messages or logs.
- Testing for Weak Cryptography: Tests the use of cryptography in the application to ensure that the algorithms and protocols used are not vulnerable to attacks.
- Business Logic Testing: Evaluates the business logic of the application to detect any flaw that could be exploited to bypass or compromise business processes.
- Client-side Testing: Focuses on the aspects of the application that run on the client-side, like JavaScript, to verify that they are not vulnerable to attacks such as XSS or clickjacking.
- API Testing: Tests the application programming interfaces (APIs) exposed by the application to ensure they are secure against common abuses and attacks.
The Different Pentesting Strategies
Blackbox
- Conditions similar to those of an external attacker
- No accounts provided by the client
- Perfect for quickly testing a small-scale site or simulating an attacker
Greybox
- User accounts provided by the client
- Covers the entirety of the application
- Perfect for a standard web application
Whitebox
- Complete information provided by the client (user accounts, source code, available documentation...)
- Discovery of vulnerabilities that are difficult to detect by other means
- Perfect for a complex application
© 2017 - 2024 Oppidum Security