Application pentest



Whether it is a heavy client or a mobile application (Android, iOS), our consultants are able to provide an in-depth analysis of their security based on reverse engineering techniques and attacks on network communications and APIs.

Technologie vecteur créé par pikisuperstar - fr.freepik.com

Source code analysis (SAST)

Identify risky practices and vulnerabilities introduced in the application source code.


Dynamic analysis (DAST)

Exploitation of system vulnerabilities on binaries or scripts (dll hijacking, buffer overflow, Powershell / Bash injections), attack on communications between the application and the servers based on web exploitation techniques: exploitation of weaknesses in the API, vulnerabilities in the application logic.

In which cases should you choose application penetration testing?

You develop iOS or Android mobile applications, or heavy clients (.net, Java, scripts, binaries).

You want to check the security level of a third-party application.

Mission organization

An initiation meeting makes it possible to identify the needs and scope of the mission, as well as any constraints.

A legal mandate between the different parties is published in order to supervise DSecBypasss audit service.

The consultant in charge of the mission can be reached at any time during its execution and informs the customer in the event of a critical discovery.

g

Penetration test results

The deliverables of the mission include a report as well as two optional restitutions.

The report includes a summary of the results as well as the details of the identified vulnerabilities and recommendations.

The technical restitution is an opportunity for the consultant to present his approach and his results in an interactive way, and to discuss with the client and his teams on the action plan. Managerial restitution makes it possible to address an executive audience.