aricoma logo avatar

#1 in Enterprise IT

Penetration tests of web applications

During web application security testing, our tasks are mainly focused on manual activities supported by outputs from automated tools.

The aforementioned approach is able to detect a wider range of vulnerabilities that automated tests are not able to easily detect, especially in business logic, complex communication links, authorization mechanisms or the possibility of exposing publicly available sensitive data.

Penetration tests and vulnerability scans are primarily aimed at identifying security weaknesses that may be present in the configuration, during data processing, or through improper implementation. It also includes a security scan of all functionality, authentication and authorization mechanisms, business logic, how sensitive information is handled, and other related areas.

Web applications

When performing penetration tests, we rely primarily on the current OWASP Testing Guide methodology, using the following techniques: ​

Information Gathering
  • Phase aimed at gathering as much information as possible,
  • Using freely available tools (search engines, scanners, simple HTTP requests or specially adapted requests),
  • Disclosure of information, for example in the form of error messages or announcements of versions and technologies used.

Configuration and Deploy Management Testing
  • Infrastructure and topology architecture analysis,
  • Research of technical information such as source code, enabled HTTP methods, administration functionality, authentication methods and infrastructure configuration information.

Identity Management Testing
  • Verification of mechanism for managing users and their roles,
  • Testing of parameters, identification of security flaws, vulnerabilities leading to direct compromise of user accounts.

Authentication Testing
  • Analysis of the functionality of the authentication process and attempts to bypass it.

Authorization Testing ​
  • Detecting ways to bypass authorization rules and setting up user rights,
  • Finding ways to escalate granted privileges.

Session Management Testing
  • Analysing the possibility of stealing an authenticated user session, detecting the possibility and execution of Man-in-the-middle and similar attacks.

Data Validation Testing
  • One of the most important parts of penetration testing - here the resistance of the application to SQL/Code Injection, Cross-Site Scripting, Local File Inclusion and other attacks is fully examined.

Error Handling Testing
  • Test for leakage of sensitive information from often very detailed error messages, generating non-standard inputs in both size and content.

Cryptography Testing
  • Checking whether the application accepts obsolete, broken or completely unsuitable (no) cryptographic mechanisms.

Business Logic Testing
  • Examining all workflow functionalities and looking for the possibility of their misuse to perform activities that are not in accordance with the possibilities of use in a given application.

Client Side Testing
  • Verification how effective the application's mechanisms are at protecting users from specialised attacks that target the user and their browser directly,
  • Testing various types of client scripting language injection and manipulation of browser-managed parameters.
Our penetration tests: for those who want to avoid unexpected visits in the world of cyber enemies, but would like to surprise them with their own preparedness.

Share

DO NOT HESITATE TO
CONTACT US

Are you interested in more information or an offer for your specific situation?

By submitting the form, I declare that I have familiarized myself with the information on the processing of personal data in ARICOMA.