Web Assessment

Using a blend of automated, manual testing and maximum coverage of the threat profile, a complete report with clear priorities are compiled into a comprehensive report.

Of course every engagement is different, but some of the usual suspects are:

  • Poor authentication controls
  • Improper authorization checks
  • Industry and application specific logic flaws
  • SQL injection SQLi
  • Cross site scripting XSS
  • Cross site request forgery of important functions
  • Information leakage DLP
  • And many more

For full details of how our testing methodology would help secure your web site, please see the contact page