Web Application

Vulnerability Assessment & Penetration Testing


This is an assessment of the functionality and resilience of the compiled application to known threats. This assessment focuses on the compiled and installed elements of the entire system: how the application components are deployed, communicate or otherwise interact with both the user and server environments.


Application scanning tools as well as manual testing with and without application credentials are used to perform this assessment. Typically some host, network, and general information security practices are assessed as part an application vulnerability assessment.


This assessment will answer questions like:
  • Does the application expose the underlying servers and software to attack?
  • Can a malicious user access, modify, or destroy data or services within the system?

Penetration tester would involve the auditing of an application (typically web based) and looking for a minimum list of vulnerabilities like:

  • SQL Injection
  • Cross Site Scripting
  • Cross Site Request Forgery
  • Improper data sanitization
  • Buffer overflows
  • Mis-configured/weak authentication

Our Branches

Kuwait

Phone: +965 22417158 / 22250008
Fax: +965 22417156

Dubai

Phone: +971 042781090 / 042781091
Fax: +965 22417156

Newsletter

Subscribe