Web Application Security
Web Application
Penetration Testing.
No Vulnerability Undetected.
OWASP Top 10:2021, API Security, Business Logic - OSWA-certified experts find what automated scanners miss. Fixed-price quote in 24h.
Trusted by our clients
- Web App Pentests Completed
- 500+
- of applications with vulnerabilities (OWASP 2021)
- 94%
- to Fixed-Price Quote
- 24h
- manually verified findings
- 100%
OWASP Top 10:2021
We test all critical vulnerability classes
The OWASP Top 10 standard defines the most common and critical security risks in web applications. Our test covers all ten categories fully - every finding manually verified, no noise in the report.
Broken Access Control
We test authorization checks at all levels: horizontal and vertical privilege escalation, IDOR, misconfigured CORS, and missing access control on API endpoints.
Cryptographic Failures
We analyze TLS configuration, encryption of sensitive data (at rest and in transit), weak algorithms, flawed key generation, and insecure password storage.
Injection
SQL, NoSQL, OS, LDAP, and XPath injection. All input parameters tested for missing validation and parameterization - in forms, API parameters, and HTTP headers.
Insecure Design
We analyze architectural decisions for missing security controls: insecure password reset flows, missing rate limiting, and weak tenant separation.
Security Misconfiguration
HTTP security headers, cloud storage permissions, debug mode in production, unnecessary features, and default credentials. We systematically review the entire server configuration.
Vulnerable Components
We inventory all libraries, frameworks, and components used and cross-reference against known CVEs - including transitive dependencies in frontend and backend.
Auth Failures
Session management, brute force protection, secure token generation, MFA bypass, credential stuffing, flawed logout implementation, and JWT security are fully tested.
Software & Data Integrity
Deserialization vulnerabilities, insecure CI/CD pipelines, missing code signing, and supply chain risks in dependencies. We also test update mechanisms for tampering.
Logging Failures
We verify that security-relevant events (failed logins, access attempts on sensitive data) are logged and that logs are protected against tampering. SIEM integration is evaluated.
SSRF
Server-Side Request Forgery: We test whether attackers can force the server to make requests to internal services, metadata endpoints (AWS IMDS), or other internal systems.
All ten categories are tested manually - no automated scanning. Request a sample report
Methodology
Black-Box, Grey-Box, or White-Box?
Each pentest approach simulates a different attacker perspective. We advise you on which approach delivers the most value for your specific use case.
Black-Box Test
No prior knowledge, no access - our testers start like an external attacker from the internet. We conduct full reconnaissance and attempt to gain access independently.
Best suited for:
- Realistic attacker simulation
- External attack surface assessment
- Compliance evidence (PCI DSS)
Grey-Box Test
We receive test credentials and basic application architecture information. This enables more efficient, deeper analysis - with the best balance of coverage and cost.
Best suited for:
- Maximum coverage within budget
- Testing authenticated features
- NIS-2 and GDPR Article 32
White-Box Test
Full access to source code, architecture documentation, and configurations. Enables the deepest analysis including code review, logic flaws, and configuration-based vulnerabilities.
Best suited for:
- Deepest vulnerability coverage
- Critical custom-developed systems
- Combined secure code review
API Pentest
Targeted Testing of REST and GraphQL APIs
Modern web applications are API-first. Many security vulnerabilities don't originate in the user interface but in the backend APIs that power it. We test following the OWASP API Security Top 10.
Authentication & Authorization
JWT token manipulation, OAuth flows, flawed scope validation, API key leakage in responses, BOLA (Broken Object Level Authorization), and BFLA (Broken Function Level Authorization).
Rate Limiting & Input Validation
Missing rate limiting (brute force on login endpoints), mass assignment, injection at query level, flawed input validation in JSON payloads, and parameter pollution.
Business Logic & GraphQL
Testing multi-step processes (order flows, payment processes), race conditions, GraphQL introspection, batching attacks, query depth, and field suggestion vulnerabilities.
OWASP API Security Top 10 - Our Test Catalog
- API1 Broken Object Level Authorization Critical
- API2 Broken Authentication Critical
- API3 Broken Object Property Level Authorization High
- API4 Unrestricted Resource Consumption High
- API5 Broken Function Level Authorization High
- API6 Unrestricted Access to Sensitive Business Flows Medium
- API7 Server-Side Request Forgery High
- API8 Security Misconfiguration High
- API9 Improper Inventory Management Medium
- API10 Unsafe Consumption of APIs Medium
What we typically find in web apps
Anonymized examples from real web application pentests
SQL Injection in search function enables complete database exfiltration
Due to missing parameterization in the search query, an attacker can read the entire database without authentication - including password hashes, personal data, and internal configuration. Reproduced with a single HTTP request.
Stored Cross-Site Scripting (XSS) in comment field - session hijacking possible
Missing output encoding allows persistent injection of JavaScript code. All users viewing the content are affected. Attackers can steal session cookies, inject phishing content, or execute further attacks on other users.
Insecure Direct Object Reference (IDOR) - access to other users' data
The API does not verify whether the requested resource belongs to the authenticated user. By simply incrementing ID parameters in API requests, a logged-in user can access the data of any other user.
Missing brute force protection on login endpoint - account takeover via credential stuffing
The login endpoint is not protected by rate limiting, account lockout, or CAPTCHA. Attackers can apply known password lists against all user accounts with automated tools. Combined with public data breaches, this significantly increases the risk.
On average, we find 2-4 critical vulnerabilities per web app pentest. Request a sample report
What does a web app pentest cost?
No hidden costs. No hourly rates. Fixed-price quote in 24 hours.
Single-Page App
from EUR 5,000
5-7 business days
- OWASP Top 10
- Up to 3 user roles
- Free retest included
Complex Web App
from EUR 8,000
8-12 business days
- OWASP Top 10 + API Sec.
- Multiple roles + workflows
- Business logic testing
- Free retest included
Enterprise + API
from EUR 12,000
10-15 business days
- Multiple microservices
- REST + GraphQL APIs
- SARIF output for CI/CD
- Free retest included
Includes management summary, CVSS ratings, and free retest. All prices ex. VAT.
Web App Pentest Retainer - plannable, regular, cost-effective
Quarterly tests at reduced rates - ideal for organizations that want to test after every major release, or for NIS-2 and PCI DSS compliance.
Compliance
Your web app pentest meets regulatory requirements
Our report is designed as compliance evidence covering the requirements of the most important regulations.
NIS-2 Directive
The NIS-2 Directive requires technical security measures including penetration testing for essential and important entities. Our report is designed as regulatory compliance evidence.
GDPR Article 32
GDPR Article 32 requires appropriate technical and organizational measures. Regular web app pentests are recognized as state-of-the-art and strengthen your legal position in data protection audits.
PCI DSS Req. 11.4
PCI DSS v4.0 Requirement 11.4 mandates regular penetration tests for merchants and service providers handling card data. Our report meets PCI DSS reporting requirements.
DORA Art. 26/27
The DORA regulation has required threat-led penetration testing (TLPT) for financial entities since January 17, 2025. Our approach follows TIBER-EU guidelines.
Why AWARE7 for Your Web App Pentest
Was uns von anderen Anbietern unterscheidet
Reine Awareness-Plattformen testen keine Systeme. Reine Beratungskonzerne sind zu weit weg. AWARE7 verbindet beides: Wir hacken Ihre Infrastruktur und schulen Ihre Mitarbeiter - mittelstandsgerecht, persönlich, ohne Enterprise-Overhead.
Forschung und Lehre als Fundament
Rund 20% unseres Umsatzes stammen aus Forschungsprojekten für BSI und BMBF. Unsere Studien analysieren Millionen von Websites und Zehntausende Phishing-E-Mails - publiziert auf ACM- und Springer-Konferenzen. Drei unserer Führungskräfte sind gleichzeitig Professoren an deutschen Hochschulen.
Digitale Souveränität - keine Kompromisse
Alle Daten werden ausschließlich in Deutschland gespeichert und verarbeitet - ohne US-Cloud-Anbieter. Keine Freelancer, keine Subunternehmer in der Wertschöpfung. Alle Mitarbeiter sind sozialversicherungspflichtig angestellt und einheitlich rechtlich verpflichtet. Auf Anfrage VS-NfD-konform.
Festpreis in 24h - planbare Projektzeiträume
Innerhalb von 24 Stunden erhalten Sie ein verbindliches Festpreisangebot - kein Stundensatz-Risiko, keine Nachforderungen, keine Überraschungen. Durch eingespieltes Team und standardisierte Prozesse erhalten Sie einen klaren Zeitplan mit definiertem Starttermin und Endtermin.
Ihr fester Ansprechpartner - jederzeit erreichbar
Ein persönlicher Projektleiter begleitet Sie vom Erstgespräch bis zum Re-Test. Sie buchen Termine direkt bei Ihrem Ansprechpartner - keine Ticket-Systeme, kein Callcenter, kein Wechsel zwischen wechselnden Beratern. Kontinuität schafft Vertrauen.
Für wen sind wir der richtige Partner?
Mittelstand mit 50–2.000 MA
Unternehmen, die echte Security brauchen - ohne einen DAX-Konzern-Dienstleister zu bezahlen. Festpreis, klarer Scope, ein Ansprechpartner.
IT-Verantwortliche & CISOs
Die intern überzeugend argumentieren müssen - und dafür einen Bericht mit Vorstandssprache brauchen, nicht nur technische Findings.
Regulierte Branchen
KRITIS, Gesundheitswesen, Finanzdienstleister: NIS-2, ISO 27001, DORA - wir kennen die Anforderungen und liefern Nachweise, die Auditoren akzeptieren.
Mitwirkung an Industriestandards
OWASP · 2023
OWASP Top 10 for Large Language Models
Prof. Dr. Matteo Große-Kampmann als Contributor im Core-Team des international anerkannten OWASP LLM-Sicherheitsstandards.
BSI · Allianz für Cyber-Sicherheit
Management von Cyber-Risiken
Prof. Dr. Matteo Große-Kampmann als Mitwirkender des offiziellen BSI-Handbuchs für die Unternehmensleitung (dt. Version).
Organizations that trust us
Sill Optics GmbH
Feststellung der Angriffsfläche bei Sill Optics GmbH
Pentesting & SchwachstellenscansXignSys GmbH
Whitebox-Penetrationstests eines Authentifizierungsdienstes als Mobile- und Web-Anwendung
Pentesting & SchwachstellenscansTWINSOFT GmbH & Co. KG
Externer Penetrationstest einer iOS-Applikation
Three Steps to Your Web App Pentest
No lengthy procurement process. You talk to us - and we get started.
Initial Consultation
30 minutes, free of charge. We clarify scope, methodology, roles, and timeline for your web application.
Fixed-Price Quote in 24h
Binding, transparent, no hidden costs. You decide at your own pace - no pressure.
Pentest Begins
Our OSWA-certified team gets started. You receive ongoing updates and the report with a debrief session.
Frequently Asked Questions about Web App Pentesting
What exactly is tested in a web application penetration test?
How does a web app pentest differ from an automated vulnerability scan?
How long does a web application penetration test take?
Are REST APIs and GraphQL also tested?
Can the pentest be integrated into our CI/CD pipeline?
Is a retest included in the price?
What is the difference between black-box, grey-box, and white-box testing?
What does the pentest report contain?
How do I prepare my web application for the pentest?
How does the web app pentest help with NIS-2, GDPR, and other compliance requirements?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelHave your web application professionally tested for vulnerabilities
94% of web applications have security vulnerabilities (OWASP Top 10, 2021). Find them before attackers do - with OSWA-certified experts and a fixed-price commitment.
Kostenlos · 30 Minuten · Unverbindlich