Web Application Vulnerability Testing is an assessment of potential risks of exploit on web applications. Web applictions are usually the most vulnerable parts of an application
API testing specifically targets your APIs to expose porential risks. APIs poste a different set of risks as compared to web applications and need specialized expertise.
Perform an assessment of your Policies, Procedures, Training, etc against industry standards such as: NIST 800-53 NIST 800-37 NIST Cyber Security Framework CMMC NIST 800-171
Network penetration testing identifies vulnerabilities on external, and internal systems. A network pen-test specifically targets network and infrastructure components.
Vulnerability Assessment is often accompanied by Policies, Rules of Engagement and Processes.
We cover the gamut using automated as well as manual penetration testing:
· Networks
· Infrastructure
· End-points
· Application code
· Web based Applications
· Client server Applications (Thin Client and Thick Client Applications)
· SOA/Web services Applications
· Mobile based applications
· Cloud based applications
· Databases
· Application platforms/containers
· COTS (Commercial Off the Shelf Software) and GOTS (Govt. Off the Shelf Software)
....etc
OWASP Top 10 2013-2017-2021
Web Security Testing Guide (WSTG)
Technical Guide to Information Security Testing and Assessment (NIST 800-115)
Bug Bounty Hunt Methodology
CWE/SANS TOP 25 Most Dangerous Software Errors
....etc
· Information Gathering
· Configuration Testing
· Secure Transmission Testing
· Authentication Practice Testing
· Session Management Testing
· Authorization Testing
· Data Validation Teating
· Denial of Service Testing
· Business Logic Testing
· Cryptography Testing
· Risky Functionality Testing
One of our experts will get back to you to set up a call at your convenience.
We will set up a free no obligation call to discuss your needs. We will provide an optimal strategy and customized proposal to address your needs.
If you like what you see and hear, we will get started with a formal conract, rules of engagement and project charter followed by the implementation.
We do not use a cookie cutter apporach. We customize our testing based on your requirements and the nature of your portfolio in the most optimal and effective manner possible.
We not only give you detailed reports, we perform a comprehensive False Positive Analysis and categorization of findings.
We will work hand in hand with you to remediate the findings and create Plan of Action & Milestones (POA&M).
Our staff has expertise across a wide variety of platfiorms and are able to customize testing strategies accordingly.
For example: testing an "on premise" application follows a different approach than a "Cloud application" as there are more nuances when it comes to testing a Cloud SaaS platform.
Copyright © 2019 In Depth Incorporated - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.