Hacken Token
$ -- --.--
At a glance

The explosion of web and mobile applications presents an entirely new set of security challenges. While most of the tools and practices of traditional web and desktop applications are equally applicable to mobile, there are some unique concerns to keep in mind, including lost or stolen devices, mobile malware, targeted attacks on devices, and more.

A vulnerability assessment usually includes a mapping of the network and systems connected to it, an identification of the services and versions of services running and the creation of a catalogue of the vulnerable systems. A vulnerability assessment normally forms the first part of a penetration test. The additional step in a penetration test is the exploitation of any detected vulnerabilities, to confirm their existence, and to determine the damage that might result due to the vulnerability being exploited and the resulting impact on the organisation.

Methodology

During this phase, we will utilize best on a market methodology created by Open Web Application Security Project (OWASP) and test cases from OWASP Application Security Verification Standard Project. Web and Mobile Application Penetration Testing efforts will be based on the following guidelines and security standards:

  • OWASP Application Security Verification Standard
  • OWASP Secure coding guidesa
  • OWASP Top 10 Risks
01

Web-specific

Authentication: we will evaluate the adequacy of the application’s authentication control mechanism as it processes the identity of individuals or entities.

Input Manipulation: we will evaluate the adequacy of the application’s input controls as the application processes inputs received from different interfaces and\or entry points.

Information Leakage: we will determine the type of information that is transferred back to the user or stored in the client’s machine.

Session Management: we will evaluate the adequacy of the application’s session management control mechanism as it traces the activities performed by authenticated application users.

Output Manipulation: we will determine if it is possible to get information from the temporary Internet files, cookies, and other application objects.

Other Tests: we will assess the application based on other attacks, tampering methods, and manipulations commonly used by hackers.

02

Network-specific

Application testing includes checks for the presence of the most critical vulnerabilities including the OWASP Top 10 vulnerabilities, such as:

  • Code Execution
  • Insecure cookie flags
  • Buffer Overflows
  • URL redirection
  • File Inclusion
  • Remote XSL inclusion
  • CRLF Injection
  • Cross Site Scripting in URI
  • Cross Frame Scripting (XFS)
  • Unrestricted File Uploads Checks
  • XPath Injection
  • Discover Sensitive Files/Directories
  • Directory Listings
  • Looks for Common Files (such as logs, traces, CVS)
  • Directory Traversal
  • Script Source Code Disclosure
  • Error Messages with sensitive information
  • Usage of components with known vulnerabilities.
  • Path Disclosure
  • Unchecked redirections and transitions, and etc.
  • Source Code Disclosure

Network layer testing includes checks for the presence of the most critical vulnerabilities, such as:

  • Outdated software
  • Absence or weak authentication mechanisms
  • Insecure/default configurations
  • Deprecated protocols
  • Default/weak passwords
  • Information disclosure
  • Code injection
  • Data encryption in network connections and other checks.
  • Denial of service