- Test your web application to discover security issues.
- Create an extensive report with all the vulnerabilities found, risk rate them according to a standardized methodology, and let you know exactly what should be done in order for them to no longer represent a vulnerability.
The process:
1. A kick-off meeting is held with the client to discuss the website features, agree on the scope, agree on the testing method (black-box, gray-box testing), agree on the starting date of the pentest.
2. Additional details that won't be covered on the kick-off meeting can be agreed via email.
3. A start notification is sent to the client when the pentest of the service that is being tested starts.
4. The application is being tested during the agreed time-frame.
5. When the application testing finishes, a Pentest Report is sent to the client with all the vulnerabilities found.
6. After the client reviews the findings, Review Meeting is held to discuss the findings, solutions, next steps.