Application penetration tests

We perform penetration testing of APIs, web, mobile or desktop applications. We test according to the OWASP methodology, which includes more than 90 security areas and our best practices.

Rectangle 36

Application testing

Applications are undoubtedly the foundation of business. When developing applications, the primary focus is on functionality, appearance and certainly price. Therefore, applications are recommended to be tested both before deployment to production and regularly during their use. Some security flaws stem from faulty application design.

Main test scenarios

The most common findings

Black box testing

  • The submitter provides only the URL of the web application.
  • The tester maps the environment using the same methods as a hacker without the organization’s know-how.
  • More time consuming than white box testing.

White box testing

  • The client provides source codes, accounts with administrator rights and documentation.
  • This testing specializes in deeper application issues such as dangerous sub-vulnerability strings and application logic errors.
Rectangle 36

Mobile app testing (iOS & Android)

Mobile apps are a known weakness of information systems.

By penetration testing mobile apps, companies can gain insight into source code vulnerabilities, bottlenecks, and attack vectors on these apps.

We test both Android and iOS platforms.

Main test scenarios

Most common findings

Evaluation of penetration tests

Each penetration test is followed by a phase of documenting the entire test process, describing any vulnerabilities found and rating their severity according to the CVSS classification. 

This is the technical part of the report, which is intended for security managers, engineers and application developers, where for each vulnerability a recommendation is also given on how to prevent or solve the problem.

At the end of the report, you will find a management summary that explains in an understandable way to the company’s management the vulnerabilities and security gaps found, their severity and ways to fix any problems.

On request, we can send you a sample of the resulting report. 

Rectangle 36 (1)

Contact us

Contact us using the contact form and our specialist will get back to you within 24 hours.

Request for sample report of test results

Žadost o vzorovou zprávu výsledků z testu