03 · Pentest

Web & Mobile Application Penetration Testing

Modern application attacks aren't about SQL injection anymore. They're about business logic, authentication chains, API trust assumptions, and the mobile-specific issues every standard scanner misses. We test the way real attackers do.

  • OWASP
  • Auth
  • Business Logic
Typical duration
4–6 weeks
Team
2 senior application testers
Prerequisites
Staging env + test accounts per role
Deliverable
Per-endpoint findings + fix diffs

Modern application attacks aren't about SQL injection anymore. They're about business logic, authentication chains, API trust assumptions, and the mobile-specific issues every standard scanner misses. We test the way real attackers do.

What is Application Penetration Testing?

Application penetration testing is a hands-on assessment of a specific web or mobile application — looking for vulnerabilities an attacker could exploit to access data, escalate privileges, or compromise the underlying infrastructure.

Modern application security testing goes far beyond SQL injection and XSS. We focus on business logic flaws, authentication and authorization weaknesses, API trust assumptions, and the application-layer issues that turn a “secure” application into a breach in production.

Why your applications need hands-on testing

The application layer is where most modern breaches happen. Network controls have hardened over the last decade. Endpoint detection works. What gets attackers in now is the business logic of the applications you expose to users — the workflows, the trust chains between services, the implicit assumptions about how a user “should” behave.

These are the issues we find again and again that scanners miss entirely:

  • Authorization flaws — the API endpoint that returns any user’s data if you change one ID parameter
  • Authentication chain weaknesses — multi-factor auth that’s bypassable through the password reset flow
  • Race conditions — purchasing flows that double-credit accounts under concurrent requests
  • Token handling errors — JWTs accepted with none algorithm, refresh tokens with no rotation
  • Mobile-specific flaws — API keys hardcoded in mobile binaries, cert pinning bypassable through frida, sensitive data in Android logs
  • API design flaws — internal admin endpoints exposed without authentication on a different subdomain

A scanner cannot find these. They require an experienced tester who understands how applications actually work.

CyberBullet’s methodology

1. Scoping & Threat Modeling

We start by understanding what your application does, who its users are, what data it handles, and what an attacker would actually want from it. This drives the test plan — we focus effort where the impact would be highest.

2. Reconnaissance & Surface Mapping

Every endpoint, every API, every authentication flow, every privilege boundary. We map the application surface comprehensively before testing anything — so we know what we’re covering and what we’re not.

3. Authenticated Multi-Role Testing

We test from every user role you have (anonymous, regular user, premium user, admin, support staff, etc.) — looking for horizontal authorization flaws (one user accessing another’s data) and vertical ones (lower-privilege users accessing higher-privilege functions).

4. Business Logic & Workflow Testing

We test your application’s actual business workflows for logic flaws — race conditions, parameter tampering, state machine bypasses, and the edge cases your developers never considered.

5. Mobile-Specific Testing (where applicable)

For mobile engagements, we add platform-specific testing: certificate pinning bypass attempts, secure storage validation, IPC analysis, deep link handling, hardcoded secrets, and runtime manipulation via frida or objection.

6. Reporting & Remediation

Every finding includes reproducible steps, request/response captures, the specific code or config change that fixes it, and a re-test recommendation once you’ve shipped the fix.

Frameworks we map findings to

  • OWASP Top 10 (web) and OWASP Mobile Top 10
  • OWASP ASVS (Application Security Verification Standard) levels 1-3
  • OWASP API Security Top 10
  • NIST CSF Identify and Protect functions
  • PCI DSS Requirement 6 — secure development
  • SOC 2 CC8.1 — change management and security testing

Who this is for

  • SaaS companies with multi-tenant data isolation requirements
  • Fintech and healthcare apps handling regulated data
  • Mobile-first products where the app is the product
  • Companies preparing for SOC 2 audits, PCI DSS, or major customer security reviews
  • Organizations recovering from an application security incident

Our methodology

Every engagement runs through the same six phases. Manual validation isn't a finishing step — it's the product.

01 · SCOPE

Scope & Authorize

We define the engagement boundary precisely before testing starts — in-scope assets, out-of-bounds targets, testing windows, and emergency-stop procedures.

  • Written authorization letters exchanged before any packet leaves our infrastructure
  • Signal / Slack channel established for real-time findings during the engagement
  • Explicit rules of engagement reviewed with legal, IT, and business stakeholders
02 · PASSIVE

Passive Reconnaissance

Before a single packet touches your infrastructure, we map your external footprint using public sources only — DNS, CT logs, code repos, internet-wide scan data.

  • Typically discovers 15-30% more attack surface than the client originally provided
  • Certificate transparency, BGP, and GitHub exposure reporting
  • OSINT profile for social engineering vectors if in scope
03 · ACTIVE

Active Discovery

We enumerate live services across in-scope assets — ports, software versions, auth mechanisms, and protocol configurations — correlated against current vuln data.

  • Hand-tuned scanning profiles — not the default Nessus run
  • Protocol-level inspection for TLS, SSH, SMB, Kerberos, LDAP
  • Service fingerprinting to ground truth before any exploitation
04 · MANUAL

Manual Validation

Every potential issue is validated by hand before it makes the report. No CVE-dumping. No false positives. This is what separates the engagement from a scan.

  • Manual exploitation attempts for any finding of High severity or above
  • Business-logic testing on top of the technical layer
  • Chained vulnerabilities analyzed as a single attack path
05 · EXPLOITATION

Exploitation & Impact

For confirmed vulnerabilities with attacker value, we attempt exploitation to prove impact — not just that a CVE applies, but what it gets you.

  • Proof-of-exploit captured for every confirmed critical finding
  • Pivot paths mapped to the actual crown-jewel data
  • Interim notification inside 24 hours for anything critical
06 · REPORT

Report & Remediate

Every finding is paired with severity rated on real exploitability, reproducible proof-of-exploit, and remediation guidance your team can ship this sprint.

  • Executive summary and technical deep-dive in a single report
  • Findings mapped to CIS, NIST CSF, and relevant compliance families
  • Retest included — we confirm the fix before we close the finding

What you walk away with

Frameworks we map to

Findings ship mapped to the control families your regulators and auditors actually check. Governance clients use these crosswalks directly in their program documentation.

  • CIS Controls v8
  • NIST CSF 2.0 / 800-53
  • PCI DSS 4.0
  • HIPAA Security Rule
  • SOC 2 Type II
  • OWASP ASVS

Questions we get asked

We already use a SAST/DAST scanner. Why do we need a manual pentest?

Scanners are great at finding known patterns — SQL injection, XSS, weak SSL config. They cannot reason about your application's business logic, can't model what authorization should look like for your specific use case, and can't chain multiple medium-severity findings into a critical breach. A manual pentest exists to find what scanners can't even see.

Do you test web AND mobile in the same engagement?

We can. If your mobile app and web app share a backend (most do), testing them together is more efficient and surfaces issues neither would catch alone — like inconsistent authorization between the web and mobile API endpoints. We scope based on what makes sense for your environment.

Do you need source code or just a working app?

Either works. Black-box testing (no code) most accurately simulates an external attacker. Grey-box (with documentation and architecture access) is more efficient and finds deeper issues. White-box (full source code review) finds the most. We recommend grey-box for most engagements — best ratio of coverage to time.

Can you test our staging environment instead of production?

Yes, and we usually prefer it. Staging environments give us full freedom to test destructive operations (account deletion, password reset flows, payment refunds) without risk to real users. We'll need staging to mirror production closely, including realistic test data and matching infrastructure configuration.

How do you handle vulnerabilities you find in third-party dependencies?

We report them with the same severity rating we'd give any other finding, and we distinguish between 'theoretical CVE in a dependency you use' and 'exploitable through your specific application code.' The former is a hygiene item; the latter is critical. Our reports tell you which is which so you can prioritize correctly.

Next step

Tell us what's on your radar — we'll tell you where to start.

A 30-minute scoping call. You talk to the senior operator who would actually run the engagement. Scoping notes back inside 24 hours.

  • No high-pressure follow-up
  • Scoping notes delivered within 24 hours
  • NDA available before the call