{"id":1460,"date":"2021-02-27T15:08:17","date_gmt":"2021-02-27T14:08:17","guid":{"rendered":"https:\/\/www.dsecbypass.com\/application-pentest\/"},"modified":"2024-07-19T09:53:01","modified_gmt":"2024-07-19T07:53:01","slug":"application-pentest","status":"publish","type":"page","link":"https:\/\/www.dsecbypass.com\/en\/application-pentest\/","title":{"rendered":"Mobile Penetration Test &#8211; Application pentest"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; next_background_color=&#8221;#101535&#8243; admin_label=&#8221;Hero Section&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#101535&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#3d3fc7 0%|rgba(61,63,199,0) 100%&#8221; background_color_gradient_start=&#8221;#3d3fc7&#8243; background_color_gradient_end=&#8221;rgba(61,63,199,0)&#8221; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto-bg-02b.png&#8221; parallax=&#8221;on&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;||0px||false|false&#8221; bottom_divider_style=&#8221;mountains&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;Application pentest&#8221; text_orientation=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; title_font=&#8221;Titillium Web||||||||&#8221; title_font_size=&#8221;66px&#8221; title_line_height=&#8221;1.5em&#8221; content_font=&#8221;||||||||&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;2em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(16,21,53,0) 50%|#101535 100%&#8221; background_color_gradient_start=&#8221;rgba(16,21,53,0)&#8221; background_color_gradient_start_position=&#8221;50%&#8221; background_color_gradient_end=&#8221;#101535&#8243; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;13px&#8221; button_one_text_color=&#8221;#4328b7&#8243; button_one_bg_color=&#8221;#ffffff&#8221; button_one_border_width=&#8221;10px&#8221; button_one_border_color=&#8221;#ffffff&#8221; button_one_border_radius=&#8221;0px&#8221; button_one_letter_spacing=&#8221;2px&#8221; button_one_font=&#8221;Titillium Web|700||on|||||&#8221; custom_button_two=&#8221;on&#8221; button_two_text_size=&#8221;13px&#8221; button_two_text_color=&#8221;#4328b7&#8243; button_two_bg_color=&#8221;#ffffff&#8221; button_two_border_width=&#8221;10px&#8221; button_two_border_color=&#8221;#ffffff&#8221; button_two_border_radius=&#8221;0px&#8221; button_two_letter_spacing=&#8221;2px&#8221; button_two_font=&#8221;Titillium Web|700||on|||||&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|||&#8221; child_filter_blur=&#8221;-2px&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_intensity_slide=&#8221;2%&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;40px&#8221; title_font_size_phone=&#8221;&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; content_font_size_phone=&#8221;15px&#8221; content_font_size_last_edited=&#8221;on|phone&#8221; title_text_shadow_style=&#8221;preset3&#8243; border_radii_image=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style_image=&#8221;preset6&#8243; button_one_letter_spacing_hover=&#8221;2px&#8221; button_two_letter_spacing_hover=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;2px&#8221; button_two_letter_spacing__hover_enabled=&#8221;on&#8221; button_two_letter_spacing__hover=&#8221;2px&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_one_text__hover_enabled=&#8221;off|desktop&#8221; child_filter_hue_rotate__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Description 2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;0px||0px||true|false&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_duration=&#8221;1500ms&#8221; animation_starting_opacity=&#8221;2%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span> <\/span><br \/><span> <\/span><br \/><span> <\/span><\/p>\n<p id=\"pentest-d-une-ou-plusieurs-applications-web\" style=\"text-align: justify;\"><span>Whether it is a <strong>thick client pentest<\/strong> or a <strong>mobile application pentest<\/strong> (Android, iOS), our consultants are able to provide an in-depth analysis of their security based on<\/span> <strong>reverse engineering<\/strong> <span>techniques and attacks on network communications and APIs.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/audit_app_v1.png&#8221; alt=&#8221;Technologie vecteur cr\u00e9\u00e9 par pikisuperstar &#8211; fr.freepik.com&#8221; title_text=&#8221;Application audit&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Types de scenarios&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_width_px=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Source code analysis (SAST)&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(60,60,200,0.2)&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;30px|16px|30px|16px&#8221; animation_style=&#8221;fold&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328B7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Identify risky practices and vulnerabilities introduced in the application source code.<\/span><\/p>\n<p><span>Analysis of application logic in native libraries or DLLs. <\/span><br \/><span> <\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Dynamic analysis (DAST)&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Titillium Web|700||on|||||&#8221; header_font_size=&#8221;14px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;Source Sans Pro||||||||&#8221; body_text_color=&#8221;rgba(255,255,255,0.7)&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(60,60,200,0.2)&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;30px|16px|30px|16px&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;300ms&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328B7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Exploitation of system vulnerabilities on thick clients (<\/span><strong>dll hijacking, buffer overflow, Powershell \/ Bash injections<\/strong><span>), attacks on communications between the application and the servers based on web exploitation techniques: exploitation of weaknesses in the API, vulnerabilities in the application logic. Exploitation of services exposed by the Android application.<br \/><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Use Cases&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"dans-quels-cas-choisir-l-audit-de-site-web\">In which cases should you choose application penetration testing?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||16px|false|false&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf0a1;||fa||900&#8243; icon_width=&#8221;130px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;|16px||16px|false|false&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">You develop iOS or Android mobile applications, or heavy clients (.net, Java, scripts, binaries).<\/p>\n<p style=\"text-align: justify;\">You want to check the security level of a third-party application.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Modalites&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"modalites-de-la-prestation\">Mission organization<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|16px||16px|false|true&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">An initiation meeting makes it possible to identify the needs and scope of the mission, as well as any constraints.<\/p>\n<p style=\"text-align: justify;\">A legal mandate between the different parties is published in order to supervise <strong>DSecBypass<\/strong>&#8216;<span>s<\/span> audit service.<\/p>\n<p style=\"text-align: justify;\">The consultant in charge of the mission can be reached at any time during its execution and informs the customer in the event of a critical discovery.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#x67;||divi||400&#8243; icon_width=&#8221;150px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Results&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#101535&#8243; custom_padding=&#8221;||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;12px&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Titillium Web|600|||||||&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_2_line_height=&#8221;1.3em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"resultats-du-test-d-intrusion\">Penetration test results<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#4328B7&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;80px&#8221; module_alignment=&#8221;center&#8221; height=&#8221;4px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|16px||16px|false|true&#8221; animation_style=&#8221;slide&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#4328b7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;60px&#8221; box_shadow_color=&#8221;rgba(60,60,200,0.4)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf681;||fa||900&#8243; icon_width=&#8221;150px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; border_color_all=&#8221;#4328b7&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The deliverables of the mission include a report as well as two optional restitutions.<\/p>\n<p style=\"text-align: justify;\">The report includes a summary of the results as well as the details of the identified vulnerabilities and recommendations.<\/p>\n<p style=\"text-align: justify;\">The technical restitution is an opportunity for the consultant to present his approach and his results in an interactive way, and to discuss with the client and his teams on the action plan. Managerial restitution makes it possible to address an executive audience.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#101535&#8243; admin_label=&#8221;Contact&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#12163d 0%|#2b2996 100%&#8221; background_color_gradient_start=&#8221;#12163d&#8221; background_color_gradient_end=&#8221;#2b2996&#8243; background_image=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/01\/crypto-bg-02b.png&#8221; parallax=&#8221;on&#8221; top_divider_style=&#8221;arrow2&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8221; button_text=&#8221;Contact us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether it is a thick client pentest or a mobile application pentest (Android, iOS), our consultants are able to provide an in-depth analysis of their security based on reverse engineering techniques and attacks on network communications and APIs.Identify risky practices and vulnerabilities introduced in the application source code. Analysis of application logic in native libraries [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1201,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1460","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1460"}],"version-history":[{"count":28,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1460\/revisions"}],"predecessor-version":[{"id":3512,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/pages\/1460\/revisions\/3512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media\/1201"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}