Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Watch a detailed dissection of a spear phishing email attack targeting a C-suite executive. Join our webinar on December 8th.

What is OWASP penetration testing?

OWASP pen testing describes the assessment of web applications to identify vulnerabilities outlined in the OWASP Top Ten. An OWASP pen test is designed to identify, safely exploit and help address these vulnerabilities so that any weaknesses discovered can be quickly addressed.

 

What are the benefits of OWASP pen testing?

An OWASP penetration test offers a number of important benefits for organisations, particularly those that develop web applications in-house and/or use specialist apps developed by third parties.

Pen testing helps organisations by:

  • Identifying and addressing vulnerabilities before cybercriminals have the opportunity to take advantage of them
  • Reducing the risk of data breaches as well as damage and disruption to services
  • Providing an independent overview of the effectiveness of security controls and better assurance for PCI DSS, ISO 27001 and GDPR compliance
  • Helping to improve software development and quality assurance practices by providing insight into cyber security risks
  • Supporting more informed decision-making around future security investments

 

When should you conduct an OWASP pen test?

All organisations that develop web applications are advised to conduct a penetration test at least once a year. However, this should be done more frequently when releasing major software updates or making significant changes to infrastructure. Regular penetration testing is required for compliance with regulations with the PCI DSS and ISO 27001, and strongly advised in the GDPR and NIS Directive.

 

What vulnerabilities does an OWASP pen test identify?

An OWASP security pentest can help to identify key vulnerabilities such as those listed in the OWASP Top Ten:

  1. Injection flaws
  2. Broken authentication
  3. Sensitive data exposure
  4. XML External Entities (XXE)
  5. Broken access controls
  6. Security misconfiguration
  7. Cross-site scripting (XSS)
  8. Insecure deserialization
  9. Using components with known vulnerabilities
  10. Insufficient logging & monitoring

For more information about each one of these vulnerabilities, view our guide to the OWASP Top Ten Web Application Security Risks.

 

Who performs OWASP pen tests?

OWASP pentests are conducted by certified ethical hackers with specialist knowledge of the latest web application development techniques and the latest security threats. Ethical hacker qualifications vary but common ones include CREST CRT and CCT APP, OCP, CEH and QSTM.

 

How long does an OWASP pen test take?

The time it takes an ethical hacker to complete an OWASP pentest depends on the scope of the test. Scoping an assessment requires information such as:

  • Type of application
  • Brief overview of the key functionality
  • Number of user roles
  • If the app uses a REST API backend and the number of API endpoints
  • Screenshots
  • Network size
  • If the test is internal or external facing
  • Whether network information and user credentials are shared prior to the pentesting engagement.

 

Why use Redscan for OWASP pen testing?

Redscan’s OWASP penetration testing service can be commissioned to assess both proprietary web applications developed in-house as well as those from third party vendors.

Our ethical hackers comprehensively test for web application vulnerabilities, including those listed in OWASP’s current Top 10, and provide the support to help address them quickly and effectively.

Our pen testers work closely with you to understand your security testing and help scope your requirements. Our OWASP pen testing engagements are conducted to the highest legal, ethical and technical standards and follow best practice in key areas such as preparation & scoping, assignment execution, post technical delivery and data protection.

At the end of each OWASP pen test, we provide a detailed report outlining the level of risks posed and the remediation advice required to help address them quickly and effectively.

 

Learn more about our penetration testing services