WEB APPLICATION PENETRATION TEST

The internet is evolving, and so are hackers. Test your web application against real-world attacks

OUR METHODOLOGY

Internet innovation facilitates numerous services being offered over the web, matched with disastrous online data theft and public disclosures. Our process simulates attacks against application functionality and business logic to provide insight and an opportunity to remediate before its too late.

INFORMATION GATHERING

All functionality is mapped to understand use cases, request and response structures

THREAT MODELLING

High-level risk assessment is performed to assess inherent threats, vulnerabilities and critical areas

ENUMERATION

A discovery process is performed to identify both public and private application resources

VULNERABILITY SCANNING & ANALYSIS

Manual and automated scans are executed to discover and classify weaknesses for exploitability

EXPLOITATION & POST-EXPLOITATION

A risk-based approach is then taken to misuse previous weaknesses identified

REPORTING

Findings are presented in an impactful concise format to support remediation efforts

LOOKING FOR OUTSTANDING
INFOSEC SERVICES?

CONTACT US, WE'RE RESPONSIVE!

OpenWave can support your security initiatives, provide consultation, and respond to security incidents. Let's begin a fulfilling journey of insightful value-added collaboration.

CONTACT US

Copyright © 2010 OpenWave Information Security Ltd.