Authentication
Login, password handling, MFA, session lifecycle, OAuth flows, magic links, password reset, SSO assertion handling.
Authentication, authorization, business logic, file handling, integrations. Manual exploitation against your single-page app, server-rendered app, or admin console. Findings come with working proof-of-concept code and a remediation track engineers can ship.
Coverage maps to OWASP WSTG and PTES. Every test category in scope unless you say otherwise.
Login, password handling, MFA, session lifecycle, OAuth flows, magic links, password reset, SSO assertion handling.
Per-route checks, per-record IDOR, broken object-level authorization, role-based vs attribute-based, multi-tenant isolation.
SQL injection, XSS (reflected/stored/DOM), command injection, SSRF, XXE, path traversal, file uploads, deserialization.
Race conditions, replay, price tampering, voucher abuse, workflow bypass, time-of-check time-of-use, multi-step transactions.
Token signing, JWT verification, session fixation, cookie flags, transport security, key management.
Webhook signature verification, OAuth callbacks, third-party SDK trust, embed contexts, postMessage handling.
OWASP WSTG v5 plus our own checklist for modern stacks (SPAs, GraphQL, JWT, OAuth, WebSockets).
Web app pentest deliverables.
20 to 50 pages depending on scope. Executive summary, finding catalog, methodology reference, remediation guidance.
Reproducible exploit code or step-by-step. Your engineers can verify every claim before triage.
Which categories were tested, which surfaced findings, which were clean. Useful for audit evidence.
One round of post-fix retest included. Each finding marked resolved or open with notes.
Common triggers for a web app pentest.
You need a pentest report that names methodology (OWASP WSTG), severity (CVSS 4.0), and the named engineer. We deliver in the format auditors expect.
The system goes live next month. You want a clean read before customers exercise the surface.
Auth rewrite, multi-tenancy added, payment integration in. Verify the new code path before users find the holes.
Your largest pipeline deal asked for a recent pentest. Sales blocked until the report lands.
Common questions for this engagement type. See main pentest FAQ for shared questions.
Typically 2–4 weeks of testing for a single SPA or server-rendered app, plus a week for the report and readout. Multi-app or complex business-logic engagements run 4–6 weeks.
Slightly. SPAs need DOM-level XSS coverage and client-side route checks. Server-rendered apps shift more focus to session and template handling. We adapt the methodology to your stack.
Production for read-only checks; staging or a production-like environment for anything that could damage data. Agreed in writing before kickoff.
30-minute scoping call covers the surface, timeline, and likely scope. Free, no NDA needed.