WEB APPLICATION PENTEST

Web application attack surface.
We find what others miss.

We test your web application like a real attacker – technically, logically, and deeply. From classic OWASP vulnerabilities to hidden business logic flaws and API abuse. No checklists, no tunnel vision – just experience, creativity, and a real attacker mindset.

Browser API DB
Why web apps are interesting

Dynamic, complex, and full of attack surface

Many entry points

Every feature, parameter, and API route can become an entry point – perfect for creative attackers using technical and logical attacks.

More than just code

Many vulnerabilities don’t originate in code but in workflows: price manipulation, booking logic, role models – this is where automated scanners fail.

API‑first means attacker‑first

Modern applications consist of frontend, APIs, and backends. More components mean more opportunities for misconfigurations and access control issues.

Our approach

Web application pentesting – structured & transparent

01 – Scoping & architecture analysis

Identify roles, endpoints, authentication flows, APIs, and critical business logic.

02 – Recon & mapping

Manually and automatically map all UI flows, parameters, tokens, API endpoints, and feature toggles.

03 – Technical attacks

SQLi, XSS, CSRF, SSRF, JWT manipulation, BOLA, header weaknesses, authentication bypass.

04 – Logic & workflow testing

Race conditions, invalid state changes, price manipulation, and business workflow flaws.

05 – Reporting & fixes

Reproducible findings, PoCs, clear prioritization, and actionable remediation guidance.

Typical findings

Where web applications are most vulnerable

Broken access control

Missing or incorrect authorization checks allow attackers to read or manipulate data of other users.

IDOR / insecure object references

Parameters can be manipulated to access other users’ accounts, orders, or pricing information.

Injection vulnerabilities

SQL injection, template injection, or command injection can lead to data loss or full system compromise.

FAQ

Frequently Asked Questions on Web App Pentesting & Security

An automated scanner is like a flashlight: it only shines where you point it. We are more like a forensic team. While scanners only find known signatures (like outdated libraries), we dig deep into your business logic.

We test manual attack vectors that no tool can understand: Can we manipulate the checkout process? Can discount codes be combined that should be mutually exclusive? Can we use IDOR vulnerabilities to view other users' data? We don't just test the surface; we test the entire architecture, including session management, token handling, and header security. A scan is a good start, but our manual pentest is the true trial by fire.
Modern apps (React, Vue, Angular) often shift logic to the frontend while the backend only delivers data via APIs. This is a goldmine for attackers. We focus heavily on BOLA (Broken Object Level Authorization) and BFLA (Broken Function Level Authorization) here.

We check: are the API endpoints sufficiently protected, or can we scrape data by manipulating IDs or parameters? How secure are your JWT tokens? Are there unprotected documentation interfaces like Swagger files that reveal sensitive information? Since APIs often form the backbone of your business, we test these interfaces as thoroughly and in as much isolation as possible.
Absolutely. A finding without a Proof-of-Concept (PoC) is worthless to a developer. You receive the exact payloads we used (e.g., the specific XSS string or manipulated SQL command), as well as screenshots or video demos of the attack.

We describe the attack path step-by-step. Your team doesn't have to guess; they can recreate the error directly in their local environment. This saves a massive amount of time during remediation and ensures that the fix actually works. We don't deliver walls of text; we deliver technical instructions.
A serious test usually takes between 5 and 14 days. The effort depends heavily on the 'attack surface': how many different user roles are there (Admin, User, Guest)? How many dynamic input options exist? Are there complex workflows like payment processing or file uploads?

Another factor is API depth. Testing a monolithic PHP site is a different level of effort than a microservice architecture with 50 endpoints. After an initial scoping call, however, we can give you an exact estimate tailored specifically to your application.
Yes, the OWASP Top 10 standard is our baseline—but we don't stop there. We use the OWASP ASVS (Application Security Verification Standard) to achieve systematic depth.

This means we don't just check for 'SQL Injection'; we go through all categories: authentication, session management, access control, input validation, cryptography, and error management. If your company needs to meet compliance requirements for audits, our report is exactly the document you can present to prove the 'state of the art' in application security.
For critical findings (e.g., we have full access to the database or can execute arbitrary code), we don't wait for the final report. We inform you immediately via instant message or phone.

We call this 'Instant Alerting.' This allows your team to start patching immediately while we continue to scrutinize the rest of the application. Security is a race against time, and we make sure you keep the lead.
Technically yes, but we recommend—if possible—a staging or QA system that is identical to production. Why? Because during a pentest, we also test destructive payloads to find the app's limits.

If you only have a live system, we adapt our testing methodology: we avoid actions that could delete data or disrupt operations. We coordinate closely with your admins to ensure, for example, that we don't accidentally send thousands of test emails to your real customers. We are professionals—we don't leave a trail of destruction behind.
With us, you don't get a 'report factory.' You work directly with the people who actually crack the code. We aren't interested in selling standardized PDF reports; we want to actually make your app more secure.

We think logically: when we test your app, we also understand your business model. We find logic errors that an AI or a 'mass agency' overlooks because we take the time to truly understand the application. After the test, we are available for a debriefing call to discuss fixes with your developers as peers.

© AccessGranted X GmbH