A Penetration Test, popularly known as a pen test, is an authorized simulated attack on a computer system (Web Application in the current scope) in a controlled environment that looks for security weaknesses, potentially gaining access to the system’s features and data.
The process typically identifies the target systems and a particular goal—then reviews available information and undertakes various means to attain the goal. A penetration test target may be a white box (which provides background and system/stack information) or black box (which provides only basic or no information except the company name/ website address). A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient, and which defenses (if any) the test defeated.
Please note that we do not use automated scanners, instead perform a complete manual testing to identify security bugs which are submitted with a working POC including a mitigation strategy. Its an end to end test cycle where we find bugs, submit, get a confirmation and post fix, we perform another complete regression test cycle regarding the bugs identified.
Category & Number of Test Cases:
Category | # of Test Cases |
---|---|
Access Controls | 11 |
Authentication & Cookies | 17 |
Configuration Management | 27 |
Input Validations | 21 |
Sensitive Information Disclosure | 18 |
Misc. | 17 |
Interested? Contact Us and Get Protected !