How it works?

An application security assessment looks at your application and reports on weaknesses found. Contrary to penetration tests, here the ultimate goal is not to penetrate the application, but to report on vulnerabilities found. Our approach is:

  • Business Driven: vulnerabilities are investigated, documented and reported according to the potential damage that may arise if they are exploited
  • Manual Driven: a skilled and experienced consultant will assess the security of your critical application
Our methodology is based on the Open Web Application Security Project (OWASP) testing guide for tests on the (web) application level. We use a mixture of automated scans using open source as well as commercial tools, followed by a verification and deeper probing of the application by a highly skilled consultant.

Web Application Security Testing includes:

  • Information Gathering
  • Configuration and Deployment Management Testing
  • Identity Management Testing
  • Authentication Testing
  • Authorization Testing
  • Session Management Testing
  • Input Validation Testing
  • Testing for Error Handling
  • Testing of Weak Cryptography
  • Business Logic Testing
  • Client-side Testing
  • API Testing