There can be multiple paths to getting data into and out of an application. Understanding the security concerns with this flow are important. Network traffic will be proxied and reviewed. Additionally, we’ll review the host for any new vulnerabilities introduced after installing the application.
Insecurely developed client-side applications could introduce vulnerabilities onto the device that is running the application—a penetration test would help identify these weak spots if they exist in your processes.
Generally, we test client-side applications for a variety of security concerns which include but are not limited to the installation procedures, binaries, memory, and execution at run time. Depending on how your client-side application is configured, some aspects of our Web Application and/or API testing methodology could also become relevant.
Schellman does perform client-side application penetration testing—our Penetration Testing Team continues to grow and is currently comprised of individuals from different backgrounds including former developers, system administrators, and lifelong security professionals. Our team is incredibly experienced, and collectively holds the following professional certifications, among others:
Client-side application-focused assessments take 1-3 weeks depending on the number of applications in scope.
You can expect to pay no less than $14,500 for a client-side application penetration test with us.
To help us understand the scope and nature of your client-side application, we’ll need detailed documentation about it, including information about any installation dependencies, install flags, environmental considerations, minimal hardware, and known limitations. We’ll also need credentials or access keys to perform authenticated requests into the API so that we may use it as intended.
Additionally, be prepared to provide application builds or configurations without SSL pinning.