Application Pentest

Discover vulnerabilities before real attackers do

Breaking in before others do

Automated scanners catch the low-hanging fruit. A manual penetration test goes after the things scanners miss — the business logic flaws, the chained vulnerabilities, the subtle authentication bypasses that only show up when a human is actually thinking about how to abuse the system.

I apply offensive hacking techniques in manual and semi-automated attacks against web applications, backend APIs, and mobile apps. To discover blind and super-blind vulnerabilities, I enhance the tests with timing and DNS-based (out-of-band) side-channels to gather findings that may surface deeper within backend systems.

Before the actual test, we’ll have a scoping call to align on the pentest scope, backend systems, exclusions, reporting format, and timeframe. This scoping ensures I spend my time on the parts that matter most to your business.

During the main part of the penetration test, I execute manual and semi-automated attacks against the target system. This approach checks for many aspects including:

  • Vulnerabilities in client and server parts of the application
  • Vulnerabilities in critical business functions, like payment etc.
  • Vulnerabilities in authentication and authorization
  • Vulnerabilities in exposed and consumed communication interfaces
  • Vulnerabilities in session or token management
  • Vulnerabilities in exposed components and dependencies
  • Vulnerabilities in error handling

Beyond checking individual categories, I also look at how these areas interact. A minor information disclosure combined with a weak session token can sometimes be chained into something far more serious than either issue alone. That kind of contextual thinking is where manual testing really earns its keep compared to automated scans.

Detailed reporting

The resulting report of the found security issues includes detailed descriptions of the findings (along with all evidence collected) and mitigation advice to remediate each issue and tips to further harden your application. To better distribute the individual findings towards the relevant parties, I categorize all findings by function (business, architecture, development, operations) to which the finding applies.

After sending the report, an on-site or remote debriefing meeting will be arranged to further discuss the report and any potential questions along with the team members assigned to remediate the findings.

This process can optionally be followed by a second check of remediated findings, which leads to an updated report.

Example pentest report

In order to get some idea of how such a report looks like, here are some results of a fictitious example application (click to enlarge the images):

Management Summary
Risk Rating & Impact
Function Assignment
Remediation Steps

Of course all pentest reports include detailed evidence for each finding, like screenshots, steps to reproduce, etc. to ease the re-testing after remediation.

Prerequisites

This kind of security check can be executed with no or minimal prior knowledge of the underlying software system (blackbox) remote or on-site. Optionally in a graybox variant some information about the architecture is given upfront.

While also possible to check live production systems, most pentests are executed against test environments, as then more offensive and riskier attacks can be attempted without disturbing the production system.

All checks and tests can be executed remotely as well as on-site at your office location. As prerequisites the following input is required to start the penetration test:

  • Access to the application (URLs, client access, etc. depending on the type of application)
  • Minimum of two different application users (with different data, i.e. different customers/tenants)
  • If the application has file uploads requiring special formats: Valid sample files
  • If the application is a service without a user interface (i.e. REST microservice): Documentation or sample requests

In order to get the best possible results, optional (read-only) access to backoffice systems processing data from the frontend system under test can be arranged. That way I can also check if some attack payloads trigger in backoffice systems as 2nd-order attacks.

This service also supports technical security requirements commonly referenced in modern cybersecurity regulations.

Pentest + attack tree bundle

Combine your penetration test with an Attack Tree Quickstart for a comprehensive view of your application’s security — from strategic attack paths to hands-on vulnerability validation. The attack tree maps the threat landscape and security controls at architecture level, while the pentest validates real-world exploitability at implementation level. Both perspectives together give you a complete picture.

Ask about special bundle pricing when booking both together.