Une question ? Contactez notre standard : 01 41 91 58 61 - Un incident de sécurité ? Faites-vous assister : 01 47 28 38 39

web penetration testing

With web penetration testing, our experts attack your website or content management system, identify your website’s specific vulnerabilities against a range of scenarios, and make appropriate recommendations.

Perimeters concerned by the web intrusion test

Website

Business applications

CMS

What are the risks for your web applications?

As part of the web penetration test, our experts identify the risks specific to your web application. Among the most recurrent:

Identity theft

Elevation of privileges

q

phishing attack

i

information retrieval

change bank details

CONTOURING BUSINESS PROCESSES

U

consulting customer information

w

employee compromise

Our approach

black box scenario

Simulation of a level attack by an external attacker with no special privileges. The purpose of this test is to assess your website’s robustness against external attackers.

gray box scenario

Assessment of the impact that a malicious individual with a user account on your website could have.

white box scenario

Intrusion testing using the website’s source code, to be more exhaustive in the search for vulnerabilities.

A qualified and compliant intrusion test

Since November 2017, Intrinsec has been PASSI RGS qualified (attestation n°20007) and PASSI LPM qualified (qualification decision n°5685) for its organizational and physical audit, configuration, architecture, source code and penetration testing activities.

Our approach is based on testing in line with theOWASP Testing Guide and Top 10 recommendations, and covers the search for technical and functional vulnerabilities within the application.

Request a quote for an application penetration test

Answer our secure qualification questionnaire and receive a concrete answer quickly to carry out the service.

If you don’t have all the information you need, we recommend that you fill in the form below.

I want more information!

Leave us a message describing your security needs, or contact us if you’d like information about our activities.

Don’t forget to enter your e-mail address or telephone number so that we can contact you as soon as possible.

Verified by MonsterInsights