RedPoint Security will attempt to penetrate the target web application to determine the effectiveness of your web application security controls. The test uses automated and manual tools to uncover vulnerabilities. Verification will also be performed to filter out any false positives commonly reported by automated tools. A report will be provided detailing all vulnerable controls, successful exploits, exploitation steps and recommendations on how to secure the vulnerabilities. The risk level based on the exposure of the vulnerability and the impact of exploiting the vulnerability will also be highlighted in the report.
RedPoint Security will assess the actions of a target mobile application mainly the security of the protocol used, the data written and read to and from the mobile file system, vulnerable libraries used and the various functionalities of the mobile application. Any insecure actions or infringement of policies will be reported.
RedPoint Security will assess the actions of a target thick client application mainly the security of the protocol used, the data written and read to and from the file system, vulnerable libraries used and the various functionalities of the application. Any insecure actions or infringement of policies will be reported.
RedPoint Security will review application code to search for code level vulnerabilities in critical modules. Code reviews will be performed by automated and manual tools. All vulnerabilities found will be verified. A report will highlight the vulnerabilities with remedy recommendations and risk ratings based on the impact of exploiting the vulnerability and the ease of which users can trigger the vulnerability.