Listing Thumbnail

    Application Penetration Testing

     Info
    The purpose of TBG Security’s application penetration test is to dive into specific applications and assess how well it can defend itself against various real-world cyber attacks.
    Listing Thumbnail

    Application Penetration Testing

     Info

    Overview

    TBG follows a combination of NIST 800-115 and OWASP Web Application Testing methodologies to fully audit the entire security posture of an application. When testing, applications engineers attempt to subvert the security controls used by the applications. Engineers are focused on identifying vulnerabilities threatening the confidentiality, integrity, and availability of sensitive information.

    When performing an application penetration test, we look at the four possible attack vectors that a hacker would be targeting.

    • Attacks against the client
    • Attacks against the Network
    • Attacks against the server(s)
    • Attacks against the backend data storage

    Detailed tasks include:

    • Information Gathering – Collecting open source intelligence about the application from search engines and other public data repositories.
    • Configuration and Deployment Management – Testing the configuration and deployment of an application provides insight into attack vectors that could possible allow exploitation.
    • Identity Management – Testing the registration process, role definitions, provisioning process, and account policies.
    • Authentication – Testing looks for known usernames, weak credentials, and lockout policies.
    • Authorization – Testing for direct object reference, directory traversal, and privilege escalation
    • Session Management – Testing for proper handling of cookies, sessions, and cross site request forgery attacks.
    • Input Validation – Testing for proper input validation ensures SQL injection and XSS attacks are mitigated.
    • Error Handling – Testing for proper error handling and generic error messages insures application do not mistakenly disclose information.
    • Cryptography – Testing cryptography checks for secure cryptographic algorithms being used for password hashing and transport protocols.
    • Business Logic – Testing for business logic ensures that proper controls are in place the prevent users from bypassing an applications flow.
    • Client Side – Testing for client-side attacks involve validating information sent from a client is properly validated server side.

    DELIVERABLES:

    At the conclusion of the application penetration test, TBG Security will produce a findings and recommendations report containing:

    An executive summary including;

    • The scope of the engagement
    • An overview of our activities
    • A high-level, categorical, risk-based breakdown of findings
    • A high-level plan for remediation

    Detailed findings

    • A risk-based list of addressable issues detailing the application component, exploit description, risk to the environment, sophistication of the attack, impact of the finding, evidence and detailed remediation recommendations.

    In addition to the above report we will also produce;

    • A high-level project plan including;
    • Activities, cost rating, level of effort, benefits to the organization, complexity, sales impact if applicable and whether the project includes people, process or technology.

    Highlights

    • Penetration testing or pen testing is an essential aspect of any security program. With over 20 years of pen testing experience our team is the best fit to find out how secure your applications really are.
    • These penetration tests can be learning opportunities for your team to understand the techniques and tactics used by hackers to penetrate your systems. Your team will learn about the latest tools and exactly how networks are exploited by a threat actor.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Please feel free to call or email with any questions