The hosting server, application and API layer are tested for vulnerabilities including configuration, transport layer, and application-layer specific flaws.
Authenticated testing is performed to identify configuration issues with the different levels of users in the system and to identify if users are able to hijack and perform the functions of users at similar and higher levels within the application.
Additionally, depending on the application exposure, testing can either be completed on-premises, or remotely from Feisty Fox Security’s secure testing lab.
Testing will include the following (where applicable):