Security holes in web applications can allow an attacker to gain full control of the web server and penetrate deeper into the network. E-commerce websites, Sharepoint portals, intranets, extranets, corporate web content, business to business websites and web services gateways are frequently targeted by malicious online groups. Web application penetration testing provides a detailed analysis of a web application's security posture and helps to defend against cyber attacks and the OWASP (Open Web Application Security Project) top ten vulnerabilities.
Our web application penetration testing process targets specific classes of vulnerabilities which could be exploited to gain unauthorised access to your web applications or web servers. We identify common security weaknesses in web applications including SQL injection, Cross-Site Scripting, Cross-Site Redirection, Cross-Site Request Forgery, directory traversal, authorisation bypass, session hijacking, session fixation, clickjacking, privilege elevation, file upload abuses, leaked data in web content, SSL encryption weaknesses and code injection attacks.
Penetration testing of web applications allows the client to address and mitigate the identified risks before malicious groups have a chance to exploit them. Our testing methodology is aligned with the OWASP guidelines and covers the following areas of web application security:
We break our testing process down further into authenticated and unauthenticated security testing. These phases are designed to cover the scenarios of a random hacker on the Internet and an authorised (but potentially malicious) web application user, respectively. Unauthenticated testing ensures that cyber attacks with no knowledge of the website/web application/web service cannot gain unauthorised access or compromise the confidentiality, integrity or availability of the system. Authorised user testing ensures that registered users of the web application cannot view or modify other user's data, elevate his/her user privileges to admin level or compromise the system in any way.
In April 2011, an attack on the Sony Playstation Network yielded 77 million registered accounts including users' names, addresses, birthdates, email addresses, passwords and security questions/answers. In a debrief meeting, Sony officials cited SQL injection (a common web application security flaw) as the method of data compromise. Sony estimated direct costs of the breach to be $171 million (or 14 billion yen).
ReactionIS have had many experiences of rectifying breached websites and are ideally placed to help protect your web infrastructure. We have seen attackers ciphen off credit card details and place malware on sites for unsuspecting users to download and install in drive-by download attacks. Attackers have also use compromised websites to insert links to their websites to boost search engine rankings and web traffic. Website defacement is also very common in government or politically sensitive orgnisations where the attackers are aiming to make a political statement, commonly termed hacktivism.
For more details on how we can help you, please get in touch.