blur circle
Ellipse 15
blur circle
blur circle
Ellipse 15
blur circle
Web Application & API Penetration Testing | INTEGRA
Application Security

Web Application & API Penetration Testing

INTEGRA's certified ethical hackers conduct in-depth penetration tests of web applications and APIs following the OWASP WSTG methodology. Based in Prague, serving clients across the Czech Republic, Slovakia and the EU — we uncover vulnerabilities in application logic, authorization and authentication and deliver clear remediation priorities with developer support.

Application Penetration Testing at INTEGRA
1 000+
Applications tested in total
7.1 avg
Findings per project on average
10+
Specialised penetration testers
8.5 MD
Average project duration
OWASP WSTG API Security CVSS 4.0 NIS2 PCI DSS
NDA from first contact
Quote within 24 hours
OSCP, OSWP, CEH certified
Remediation support included




How we test web applications and APIs

We don't rely on scanners alone. Every web app pentest at INTEGRA is led by a certified penetration tester who understands application logic — uncovering vulnerabilities in authentication, authorisation and business logic exactly as a real attacker would. Web application security testing requires human expertise, not just tools.

Manual testing by a certified specialist
Automated tools only scratch the surface. Deep vulnerabilities in business logic, authorisation and session management require a manual tester who understands how the application works and where the weak points are.
Proxy & HTTP traffic interception
All application traffic flows through Burp Suite Pro. We analyse every request, manipulate parameters, test authorisation at the individual call level and hunt for hidden endpoints and shadow APIs.
OWASP WSTG methodology
We test systematically against the OWASP Web Security Testing Guide — covering all 12 categories from information gathering to business logic testing. Every finding is mapped to OWASP Top 10 and assigned a CVSS 4.0 score.
Detailed report with proof of concept
Every finding is documented with a step-by-step reproduction guide, CVSS 4.0 severity rating, concrete remediation advice for developers and an executive summary for management. Optional retest after fixes is available.
10+ specialised penetration testers
The INTEGRA team consists exclusively of senior specialists holding OSCP, OSWP and CEH certifications. Web application projects always involve at least two testers — cross-reviewing findings eliminates individual blind spots.

Choosing the right testing approach

The depth of access we have before testing begins significantly affects the number and type of vulnerabilities we can uncover. We tailor the approach to your situation, timeline and risk tolerance.

No prior access
Black Box
We receive only the target — a URL or IP address. No credentials, no documentation, no source code. The test simulates a real external attacker who knows nothing about the application beyond its existence.
Best suited for
  • Limited budget — the fastest and most affordable testing option
  • Validating what an external attacker can reach and exploit
  • Public-facing applications and APIs
  • Situations where minimal client-side preparation is required
Most common approach
Grey Box
The tester is given user credentials, documentation, access to the application and support from the client — but no source code. Testing covers all attack vectors both without and after authentication. This is the optimal and most frequently used approach for web applications.
Best suited for
  • All attack vectors tested — unauthenticated and authenticated
  • Complex authorisation logic, multiple user roles
  • Best balance of depth, time and cost
  • NIS2, ISO 27001, PCI DSS and most compliance requirements
Maximum depth
White Box
In addition to full grey box access, the tester can request source code review for any area of interest. Used selectively — the tester decides when to look under the hood. This approach uncovers vulnerabilities that are invisible from the outside and is reserved for the most demanding security reviews.
Best suited for
  • Applications processing sensitive financial or health data
  • Pre-launch security review of a new product
  • DORA TLPT and critical infrastructure requirements
  • Highest possible vulnerability coverage per man-day

Key areas of penetration testing

We cover web applications, REST/GraphQL APIs and desktop clients communicating with back-end services. Every test is tailored to the specific stack, authentication scenarios and business logic of your application.

Web Applications
  • Reconnaissance — frameworks, versions, hidden endpoints and admin interfaces
  • Authentication — brute-force, 2FA bypass, JWT weaknesses, session fixation
  • Authorisation — IDOR, BOLA, privilege escalation, missing access controls
  • Input validation — SQL injection, XSS, SSRF, Command Injection, LFI/RFI
  • Session management — session hijacking, insecure cookies, CSRF
  • Business logic — price manipulation, limit bypasses, workflow abuse
  • Configuration — HTTP headers, verbose errors, exposed debug endpoints
  • Cryptography — weak protocols, hardcoded secrets, insecure data at rest
REST & GraphQL API
  • Authentication & tokens — weak JWT, missing expiry, API key leakage
  • Authorisation — Broken Object Level Authorization (BOLA/IDOR), BFLA
  • Rate limiting — missing throttling, object enumeration, DoS vectors
  • Input validation — injection via parameters, Mass Assignment, fuzzing
  • GraphQL specifics — introspection abuse, query depth attacks, batching
  • Exposed endpoints — shadow APIs, undocumented and deprecated versions
  • Error handling — stack traces, internal structure disclosure
  • Transport security — TLS configuration, certificate validation, MITM vectors
Desktop Applications
  • Static analysis — binary decompilation, extraction of hardcoded secrets
  • Network communication — API call analysis, certificate pinning bypass, MITM
  • Local storage — insecure storage of sensitive data, plaintext credentials
  • Protection mechanisms — licence control bypass, anti-tamper circumvention
  • Code injection — runtime patching and hooking vectors
  • Reverse engineering — API key extraction, protocol reconstruction

Most common vulnerabilities in web applications

This ranking is based on 1,619 findings from 218 penetration tests conducted in 2025. The data shows where Czech and Slovak applications have the greatest weaknesses.

#01

Broken Access Control

Missing or incorrect access controls — IDOR, BOLA, missing authorisation and privilege escalation. The most common critical vulnerability in SaaS and B2B applications.

OWASP A01:2025
15.0 %
#02

Security Misconfiguration

Default credentials, exposed debug endpoints, missing security HTTP headers and verbose error messages in production environments.

OWASP A05:2025
12.2 %
#03

Software Supply Chain Failures

Compromised open-source libraries, outdated dependencies with known CVEs and typosquatting attacks. The fastest-growing category year-on-year.

OWASP A06:2025
10.9 %
#04

Cryptographic Failures

Weak encryption, sensitive data over HTTP, hardcoded API keys in source code or git history, and use of MD5/SHA-1 for password storage.

OWASP A02:2025
9.5 %
#05

Injection (SQLi, XSS, SSTI)

SQL injection, Stored/Reflected XSS, command injection and SSTI — still prevalent in legacy systems and applications without modern frameworks and ORM layers.

OWASP A03:2025
8.1 %
Free Consultation
Do you know what an attacker would find in your application?
Book a Consultation

Real findings from penetration tests

Anonymised examples of critical and high-severity findings from production application testing in banking, SaaS and e-commerce. All are real INTEGRA projects from 2024–2025.

CRITICAL · CVSS 9+
HIGH · CVSS 7–9
MEDIUM · CVSS 4–7
HIGH · CVSS 6.5 IDOR – unauthorised access to data of 10,000+ organisations
SaaS platform (B2B)
Grey Box
Node.js · GraphQL · MongoDB
Attack Chain
  1. GraphQL schema enumeration via introspection query
  2. IDOR identified in /api/users/{id}/data with no authorisation check
  3. Access to sensitive data of 10,000+ tenants without authentication
  4. No rate limiting → real-time brute-force enumeration of IDs feasible
Remediation
  • Server-side authorisation checks on every API request
  • Rate limiting and IP throttling at the API gateway layer
  • Disable GraphQL introspection in production environments
Node.jsGraphQL OWASP A01 – Broken Access Control CWE-639

Everything you need to know about web application penetration testing

Answers to the most common questions from developers, CTOs and security managers. Didn't find what you need? Get in touch.

Find out how secure your application really is

Book a free consultation with our security team. We will assess your situation and propose the optimal web application penetration testing service scope tailored specifically to your application and stack.

Free consultation
Quote within 24 hours
NDA from first contact
Free Consultation

Žadost o vzorovou zprávu výsledků z testu