At Positive Technologies, our experts are actively involved in identifying the world’s most critical web application security flaws through ongoing hands-on research and contributions to security projects such as OWASP TOP 10, Web Application Security Consortium Threat Classification and Common Vulnerability Scoring System (CVSS).
Positive Technologies Web Application Security Tests involve detailed analysis of an application’s design, networking, operating system settings, external data sources, data warehousing, authorization mechanisms, and authentication components. We can perform an analysis from the perspective of an outside intruder ("black box") and by analyzing the source code itself ("white box").
An assessment typically follows these steps:
- Determine the analysis method (black box, white box, or a combination of both)
- Conduct automated and manual audits and inspections for individual types of vulnerabilities
- Analyze the characteristics of identified vulnerabilities (for example: complexity of use, availability, methods of operation, and potential damage in the event of an attack)
- Create scenarios that could be used by an actual attacker, and build and execute simulated attacks
- Attempt to exploit the most critical vulnerabilities through a series of coordinated attacks
- Assess outcomes and present recommendations to address identified weaknesses
The key deliverable from our testing is a report, which details:
- Test methodology
- Explanations for all identified vulnerabilities
- Likely success/impact of hacker exploitation of the most critical vulnerabilities identified
- Recommendations to mitigate the identified vulnerabilities
Positive Technologies may also provide sample application code to illustrate how the detected vulnerabilities could be eliminated, as well as guidance on web application firewall security policies and features.