Prodigy 13 - logo

Web and API Penetration Testing

Modern web applications continue to be a challenge for organizations to secure as developers build increasingly complex business applications faster than ever.

Many organizations are releasing new or updated web applications multiple times per day, each containing multiple vulnerabilities on average. Often outnumbered by developers by 100:1, security teams are struggling to keep up, and most web applications are not assessed for security issues until it’s too late. Lack of application security skills and resources inhibit many organizations from adequately defending against cyberthreats.

At Prodigy13 we use a combination of the best commercial and open source penetration tests in order to provide Web Application Testing with high detection rates with minimal false positives, ensuring you understand the true cyber risks in your web applications.

Our Web Application Scanning service is not only able to scan traditional HTML web applications, but also supports dynamic web applications built using HTML5, JavaScript and AJAX frameworks, including Single Page Applications.

Many web applications implement authentication to control access to sensitive user data, which can inhibit the ability of vulnerability scanners to assess the application. Our Web Application Scanning supports a broad range of authentication options, such as form-based authentication, cookie-based authentication, NTLM support, and Selenium based authentication, to address most web application requirements.

We offer professional RESTful API pen testing as well as through OpenAPI (Swagger) specification files.

Optional manual test remediation review and official validation letter, issued by our engineering team, and certifying the validity of your fixes (vulnerabilities addressed, false positives confirmed, etc). 

Business and audit friendly reports are available instantly or upon request and provided in multiple formats (CSV, PDF, HTML).


What are the available pen test options?

The following tests can be run on an ad hoc basis or scheduled with a set schedule:

Config Audit
PCI DSS Audits (Internal or External)
SSL/TLS checks
Overview / Light Scan
Log4J and other popular vulnerabilities
Overview / Lightweight Scan
Comprehensive Scan
API (REST) testing
Authenticated or unauthenticated public scans (default)
Credential Bruteforce
Content Security Policy
Cookies, Headers, Forms, Query Strings, JSON checks
URL lists or auto crawl
Custom RFI parameters
WAF testing and rule validation
SIEM efficiency testing 
Attack simulation tests

Meet your compliance requirements

External web application, web server, and web API penetration testing are mandatory requirements for most compliance frameworks (ISO 27001, SOC 2, PCI DSS, NIST, HITRUST, etc). Our service and reporting options will help you not only meet your compliance requirements and satisfy your auditing team, but provide you with an improved security posture benefiting your organization and your clients.

In addition having the right security services and a robust security posture will help you obtain better cyber insurance coverage and help you lower your insurance premiums.

Our services are compatible with all major cloud providers (AWS, GCP, Azure, Rackspace, Oracle, IBM, DigitalOcean) and can be used for internal and external PCI auditing.

Pricing

NOTE: For our own Prodigy 13 clients we offer 1 FREE annual pen test.

Tests can be scheduled automatically or on demand without delays. The frequency of your tests can be adjusted to meet your compliance standards.

To get a custom quote please fill out the form located here.

Zero Trust Blog

Get email alerts when we publish new blog articles!

more blog posts:

shallow focus photography of computer codes
Compliance

A Deep Dive into Black Box Penetration Testing

Black box penetration testing is a method where testers evaluate the security of a network or system without any prior knowledge of its internal workings. This method closely simulates a real-world attack, as attackers usually do not have insider information.

Read More
Compliance

HITRUST Framework: Explanation, Phases, and Components

The HITRUST CSF is a framework that normalizes security and privacy requirements for organizations, including federal legislation (e.g., HIPAA), federal agency rules and guidance (e.g., NIST), state legislation (e.g., California Consumer Privacy Act), international regulation and industry frameworks.

Read More
Compliance

NIST CSF overview

NIST Cyber Security Framework (CSF) gives private sector organisations a framework of policies and controls to help prevent attacks from cyber criminals and detect and respond to ones that do gain access.

Read More