Security Services

Web Application Penetration Testing

Web applications are a core component for almost all companies. They are used for various reasons, and very often, capture, handle, store and transmit sensitive data (confidential business information, HR data, financial information, etc.).

The high value of the data accessed via web applications increases their value as a target, thus making regular assessments highly recommended.

Our team uses a hybrid methodology, composed of automated and manual testing, to assess external and internal web applications to identify vulnerabilities before cybercriminals do. Our assessments also include an exploitation phase, allowing our customers to better understand the risks each vulnerability poses.

Our services rely on highly skilled cyber security analysts and pen-testers with extensive experience, both in defense and offense.

What are we testing for during a Web Application Penetration Test?

Injection Flaws

Web-born threats such as SQL injection, OS Command Injection, and LDAP injection, which occur when user-supplied data is sent to a web application as part of a command or query. The attacker's malicious payload can trick the web application into executing unintended commands or accessing data without proper authorization.

Cross Site Scripting (XSS)

XSS vulnerabilities that occur when a web application accepts user supplied inputs in a web page without proper validation and escaping. Cross Site Scripting allows an attacker to execute scripts in the victim's browser, which can hijack user sessions, deface web sites, or redirect the user to malicious sites.

Broken Authentication

Authentication and session management are frequently designed incorrectly, allowing cybercriminals to compromise user credentials, keys, or session tokens, or to exploit other flaws to assume other users' identities.

Sensitive Data Exposure

Many web apps and APIs do not properly protect sensitive information, such as credit card numbers, user credentials, patient information, etc. Cybercriminals may steal or temper such weakly protected data to conduct credit card fraud, identity theft, or other crimes.

XML External Entities (XXE)

Numerous legacy or poorly configured XML parsers evaluate external entity references within XML documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.

Broken Access Control

Restrictions on what authenticated users can do are often not properly enforced which can lead to horizontal and vertical privilege escalation vulnerabilities. Attackers can exploit these flaws to access unauthorized functionality and information, such as access other users' accounts, view sensitive files, modify other users' data, change access rights, etc.

Security Misconfiguration

Result of insecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, and error messages containing sensitive information. Not only must all operating systems, frameworks, libraries, and applications be securely configured, but they must be patched/upgraded in a timely fashion.

Usage of Components with Known Vulnerabilities

Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or a server takeover. Applications and APIs using components with known vulnerabilities may undermine application defenses and enable various attacks and impacts.

Our web application penetration tests automatically include a full network test of any services running on the web server.

If your web application has an API or web service supporting access to Android and iOS mobile applications, our web app penetration test can be combined with a mobile application security assessment for a full end-to-end verification of your security posture.

Supported Web Application Testing Approaches

wizlynx group’s web application penetration testing services support the following testing approaches when assessing web apps:

Blackbox Web Application Penetration Test

Refers to testing a system without having specific knowledge of the inner workings of the information asset, no access to the source code, and no knowledge of the architecture. This approach closely mimics how an attacker typically approaches a web application at first. However, due to the lack of application knowledge, the uncovering of bugs and/or vulnerabilities can take significantly longer and may not provide a full view of the application's security posture

Greybox Web Application Penetration Test

Refers to testing the system while having some knowledge of the target asset. This knowledge is usually constrained to the URL of the application, as well as user credentials representing different user roles. Greybox testing allows focus and prioritized efforts based on superior knowledge of the target system. This increased knowledge can result in identifying more significant vulnerabilities, while putting in much less effort. Therefore, greybox testing can be a sensible approach to better simulate advantages attackers have, versus security professionals when assessing applications. Registered testing allows the penetration tester to fully assess the web application for potential vulnerabilities. Additionally, it allows the tester to verify any weaknesses in application authorization which could result in vertical and/or horizontal privilege escalation.

Whitebox Web Application Penetration Test

Refers to testing the system while having full knowledge of the target system. At wizlynx group, our whitebox penetration test is composed of a greybox test combined with a secure code review. Such assessments will provide a full understanding of the application and its infrastructure’s security posture

Our Penetration Testing Methodology

Our Penetration Testing methodology is decidedly inspired by the OWASP testing guide and the Open Source Security Testing Methodology Manual (OSSTMM):
Active & Passive Reconaissance
Vulnerability Identification
Vulnerability Exploitation
Analysis & Reporting

What will you get?

All findings will be documented in a final report, and then compared with a strengths/weaknesses profile against international standards for IT & Cyber Security. The identified weaknesses will be assessed and supplemented with recommendations and remediation actions, as well as prioritized according to the risk associated. The final report will be discussed during a presentation with you. The report will include a comprehensive and meaningful C-level summary of the executed security audit or penetration test. Additionally, it will include all detailed results with respective evidence and recommendations for future security measures.

Web Application Penetration Test Report

Our Cybersecurity Certifications

wizlynx's security consultants and penetration testers hold the most recognised certifications in cyber security and penetration testing industry such as: SANS/GIAC GPEN, GWAPT, GCIH, GMOB, OSCP, CEH, CISSP, CISA and more!