Arabic | Arabic

Application Vulnerability Assessment:

A buggy web application can lead to a complete infrastructure compromise (yes, we have seen cases like this in the real world).
Web applications can suffer from all kinds of problems ranging from remote code injection (an attacker can make the application execute arbitrary code), to access control problems (one user can view other users' private data).
We offer in-depth security analysis of web applications, including if necessary a source code review.
We have wide experience testing various web applications, such as on-line banking, e-commerce, web mail, online customer care, forums, etc. We have performed source code reviews on applications written in Java, PHP, ASP, ASP.NET, C#, and C/C++.
Web applications are usually checked for the following problems:-

  1. Authentication:
    • Does the application provide sufficiently strong authentication?
    • Are there any ways to bypass authentication?
      If passwords are used are password management mechanisms (password reset, password change) securely implemented?

  2. Authorization:
    • Are authorization checks consistently implemented?
    • Is it possible to access some pages in the application without authorization?
    • Is it possible to perform actions that require authorization without it?
  3. Access control:
    • Is it possible to access other users' data? Is it possible to gain access to administration or management functions?
  4. Session management:
    • How is session management implemented?
    • Is it possible to predict or guess session tokens?
  5. Application logic:
    • Is it possible to make the application do something unexpected?
    • For example, buy negative amount of items, or bypass order payment?
  6. SQL injection:
    • Does the application properly handle user input when used in SQL queries?
  7. Cross-site scripting:
    • Does the application treat user input properly if it is displayed to the same or other users?
  8. Code injection:
    • Does the application use user input to construct paths?
    • Does the application use some user input in oval() statements? Is it possible to upload executable files?
  9. Directory traversals:
    • Does the application use user input to construct file names?
    • Insufficient Anti-automation and some other not widely spread security flaws.

During this test, we check a working web application or website for vulnerabilities by attacks imitation.

Copyright resived Resecure me 2015 | Designed and developed by Starware