The Big Application Security Penetration Testing FAQ for Clients
Have you ever wondered what a pentest is exactly, how such a test works or what is needed for it?
Unfortunately, many of these questions cannot be answered quickly in 1-2 sentences.
“Where can I find all the information I need to do this?” you may ask. Very simple: Here! The Big Application Security Penetration Test FAQ For Clients.
We have compiled a collection of questions from all our years of experience. This contains everything you should know before, during and after commissioning an Application Security Penetration Test. Here you will find questions such as: “What is this, a vulnerability?“, “Do you find all vulnerabilities with a pentest?” or “How often should a pentest take place?“
Our FAQ is of course regularly updated and extended.
You have more questions or want to order a pentest? Contact us now!
Is your web application vulnerable to SQL Injection? With sqlmap you can test it.
CSRF Countermeasures #1: One possibility to prevent CSRF is the usage of an anti-CSRF token.
CSRF stands for “Cross-Site Request Forgery” and is a classic among web application attacks. With this attack, it is possible to perform certain user actions without them noticing it. But how exactly does this attack work?
At the it-sa 2019 we will present our innovative consulting concept Lean Application Security.
Our second office is located in Dresden, the capital of Saxony. Come have a look at our office there!