we45 - Web Application Security Testing Case Study
we45‘s Web Application Security Solutions
Web Application Vulnerability
Assessment and Penetration
Testing
Secure Software Development
Lifecycle Implementation and
Consulting
Application Security - Code
Review and Walkthroughs
Web - Product Security Consulting
and Design
Web App Security Testing - Case Study
One of the largest Messaging
Gateways in the APAC region
engaged with we45
Performed Web Security Tests for
over 5 years with other providers,
but not sure about results
Complex Application with multiple
interfaces including Web Services
Engaged to perform Comprehensive
Web Security Penetration Test
Key Objectives
Perform Comprehensive Security
Test of Messaging Gateway
Platform
Identify key risks to User
Information
Perform detailed security analysis
of Web Services - Revenue Effect
Provide comprehensive reports
detailing recommendations
The we45 Approach
Application Overview and Threat Modeling
we45’s Security Experts identified the
application’s key functionality through
an Overview process.
Identified Key Potential Risks to the
application through using Security
Risk Assessment
we45’s Methodology - Created by
CTO Abhay Bhargav, detailed in his
book Secure Java for Web
Application Development
Derivative of the world-class OCTAVE
and NIST Risk Assessment
Methodologies - Focused on Web
Apps
Application Security Risk Assessment &
Threat Modeling - 2
Application Security Threat
Modeling - Critical in identifying
potential attack scenarios
Identified Trust Boundaries for the
in-scope Web Apps
Extremely useful for Code Reviews,
Security Testing and Application
Security Documentation
we45’s Security Experts perform
Threat Modeling based on
Microsoft’s renowned STRIDE
Methodology
we45 Web Application Security Testing
Hybrid Methodology - Automated and Manual Web Application
Security Testing for target application
Apart from commercial and open source assessment tools, we45’s
Security Experts developed special scripts and tools to identify Security
Flaws
Security Flaws assessed - OWASP Top 10, WASC Security Flaws, SANS
Top 25, CERT-US Secure Coding Guidelines
Security Flaws for Web Services - evaluated in detail.
Security Testing Methodology
A Few Key Findings....
Deep-seated Injection Flaws in several sections of the application
Utilized specialized Injection attacks to gain access to backend database
Enumerated users and hashed passwords, including admin and DB users
Utilized Password cracking techniques to crack password hashes
Web Services Flaws
Unauthenticated Access to critical web services
Lack of Authorization checks and controls
Deep-seated issues identified with the REST Interfaces
Review & Presentation
Findings presented to
Developers, Project Managers
and CTO
Findings were explained in
detail by we45’s Security
Experts
Findings were prioritized and
agreements on remediation
were reached
Analysis & Reporting
we45 prepared a detailed Security Risk
Assessment and Code Review Report
Report was ranked by severity of
findings.
Findings were referenced with Industry
metrics like CWE, CVE and so on.
Examples were provided as code-
snippets with line number information
Multiple Recommendations and
Remediation Strategies were provided
Executive Summary and Action Plan
prepared for Management Action
Results & View into the Future
Results:
With we45’s support, client was able to
remediate all the security flaws with the
application
Enhanced Security through implementation of
a Secure Software Development Lifecycle.
The Client was awarded by their industry
peers for Security Practices and Security
Initiatives
The Future:
we45 is the trusted Application Security
Partner for this client
we45 also provides detailed product security
consulting for the client’s products
we45‘s Web Application Security Solutions
Web Application Vulnerability
Assessment and Penetration
Testing
Secure Software Development
Lifecycle Implementation and
Consulting
Application Security - Code
Review and Walkthroughs
Web - Product Security Consulting
and Design
we45 - Web Application Security Testing Case Study

More Related Content

PPTX
Security Testing
PPTX
Security testing
PDF
Testing Web Application Security
PDF
Web Application Security Testing Tools
PPTX
Security testing fundamentals
PPS
Security testing
PDF
Introduction to Application Security Testing
PPTX
Security Testing for Web Application
Security Testing
Security testing
Testing Web Application Security
Web Application Security Testing Tools
Security testing fundamentals
Security testing
Introduction to Application Security Testing
Security Testing for Web Application

What's hot (19)

PDF
The Complete Web Application Security Testing Checklist
PDF
Introduction to Security Testing
PPTX
Penetration Testing
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PPT
Security Testing
PPT
Get Ready for Web Application Security Testing
PPTX
OTG - Practical Hands on VAPT
PDF
Security testing presentation
PDF
Web Application Security 101 - 03 Web Security Toolkit
PDF
5 Important Secure Coding Practices
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
PPTX
Security Testing Training With Examples
PPTX
A new web application vulnerability assessment framework
PDF
Security testing-What can we do - Trinh Minh Hien
PPTX
Cloud Security vs Security in the Cloud
PDF
Web Application Security 101
PPTX
Web Application Security 101
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PPTX
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
The Complete Web Application Security Testing Checklist
Introduction to Security Testing
Penetration Testing
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Security Testing
Get Ready for Web Application Security Testing
OTG - Practical Hands on VAPT
Security testing presentation
Web Application Security 101 - 03 Web Security Toolkit
5 Important Secure Coding Practices
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Security Testing Training With Examples
A new web application vulnerability assessment framework
Security testing-What can we do - Trinh Minh Hien
Cloud Security vs Security in the Cloud
Web Application Security 101
Web Application Security 101
[OPD 2019] AST Platform and the importance of multi-layered application secu...
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Ad

Viewers also liked (7)

PPTX
Continuous and Visible Security Testing with BDD-Security
PPTX
Security testing ?
PDF
Software Project Management: Testing Document
PDF
DevOpsCon 2016 - Continuous Security Testing - Stephan Kaps
PDF
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
PPSX
8 Access Control
DOCX
Audit Checklist for Information Systems
Continuous and Visible Security Testing with BDD-Security
Security testing ?
Software Project Management: Testing Document
DevOpsCon 2016 - Continuous Security Testing - Stephan Kaps
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
8 Access Control
Audit Checklist for Information Systems
Ad

Similar to we45 - Web Application Security Testing Case Study (20)

PDF
Security Code Review Case Study - we45
PPTX
we45 SecDevOps Presentation - ISACA Chennai
PDF
Application Security - Your Success Depends on it
PDF
ByteCode pentest report example
PPTX
Integrating security into the application development process
PPT
香港六合彩
PPTX
How to develop an AppSec culture in your project
PPTX
Building an AppSec Culture
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PPT
六合彩香港-六合彩
PDF
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
PDF
OWASP-Web-Security-testing-4.2
PDF
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
PPT
Software Security Engineering
PDF
Application Security on a Dime: A Practical Guide to Using Functional Open So...
PDF
we45 - SecDevOps Concept Presentation
PDF
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
PDF
Review Paper ( Research Articles )
PPTX
José Vila - ¿Otro parche más? No, por favor. [rooted2018]
PPT
Web Application Security Testing
Security Code Review Case Study - we45
we45 SecDevOps Presentation - ISACA Chennai
Application Security - Your Success Depends on it
ByteCode pentest report example
Integrating security into the application development process
香港六合彩
How to develop an AppSec culture in your project
Building an AppSec Culture
Application Hackers Have A Handbook. Why Shouldn't You?
六合彩香港-六合彩
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
OWASP-Web-Security-testing-4.2
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Software Security Engineering
Application Security on a Dime: A Practical Guide to Using Functional Open So...
we45 - SecDevOps Concept Presentation
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Review Paper ( Research Articles )
José Vila - ¿Otro parche más? No, por favor. [rooted2018]
Web Application Security Testing

Recently uploaded (20)

PDF
Testing of Tank and Tight boundaries.pdf
PPTX
Best_SEO_Service_in_India_Explained.pptx
PDF
IETM for beginners - A Quick Guide to IETM - Code and Pixels
PPTX
Importance of Tech Related Skills, programming and others
PPTX
Top Ten Brokers in 2025—Angel Sky’s Expert Guide.pptx
PPTX
Precision HVAC Duct Shop Drawing Services
PDF
Kutumbh-HRCare-Benefits-of-Working-with-Staffing-Agencies-for-ITI-Helper-Bulk...
PDF
Green & ESG Bookkeeping Accounting in the UK 2025 | Why It Matters
PPTX
A presentation of important quizzing session in IIT kgp
PDF
Lovely Foundation – NGO for Poverty in Mohali
PDF
Why IT Infrastructure Management Is Crucial for Business Success?
PDF
How to Select the Best Facility Management Services in Dehradun.pdf
PDF
Landscaping Design Installation Services
PDF
PDF
TOP PLACES TO VISIT IN HIMACHAL PRADESH.pdf
PPTX
2022-09-17 Town Hall Meeting Presentation.pptx
PDF
Warehouse Storage Solutions: Key Benefits
PDF
How AI Is Simplifying Science Education Via Practical Learning.pdf
PDF
Advisory Bookkeeping Services in the UK: A Complete Guide for 2025
PDF
Virtual Remote Monitoring in Singapore.pdf
Testing of Tank and Tight boundaries.pdf
Best_SEO_Service_in_India_Explained.pptx
IETM for beginners - A Quick Guide to IETM - Code and Pixels
Importance of Tech Related Skills, programming and others
Top Ten Brokers in 2025—Angel Sky’s Expert Guide.pptx
Precision HVAC Duct Shop Drawing Services
Kutumbh-HRCare-Benefits-of-Working-with-Staffing-Agencies-for-ITI-Helper-Bulk...
Green & ESG Bookkeeping Accounting in the UK 2025 | Why It Matters
A presentation of important quizzing session in IIT kgp
Lovely Foundation – NGO for Poverty in Mohali
Why IT Infrastructure Management Is Crucial for Business Success?
How to Select the Best Facility Management Services in Dehradun.pdf
Landscaping Design Installation Services
TOP PLACES TO VISIT IN HIMACHAL PRADESH.pdf
2022-09-17 Town Hall Meeting Presentation.pptx
Warehouse Storage Solutions: Key Benefits
How AI Is Simplifying Science Education Via Practical Learning.pdf
Advisory Bookkeeping Services in the UK: A Complete Guide for 2025
Virtual Remote Monitoring in Singapore.pdf

we45 - Web Application Security Testing Case Study

  • 2. we45‘s Web Application Security Solutions Web Application Vulnerability Assessment and Penetration Testing Secure Software Development Lifecycle Implementation and Consulting Application Security - Code Review and Walkthroughs Web - Product Security Consulting and Design
  • 3. Web App Security Testing - Case Study One of the largest Messaging Gateways in the APAC region engaged with we45 Performed Web Security Tests for over 5 years with other providers, but not sure about results Complex Application with multiple interfaces including Web Services Engaged to perform Comprehensive Web Security Penetration Test
  • 4. Key Objectives Perform Comprehensive Security Test of Messaging Gateway Platform Identify key risks to User Information Perform detailed security analysis of Web Services - Revenue Effect Provide comprehensive reports detailing recommendations
  • 6. Application Overview and Threat Modeling we45’s Security Experts identified the application’s key functionality through an Overview process. Identified Key Potential Risks to the application through using Security Risk Assessment we45’s Methodology - Created by CTO Abhay Bhargav, detailed in his book Secure Java for Web Application Development Derivative of the world-class OCTAVE and NIST Risk Assessment Methodologies - Focused on Web Apps
  • 7. Application Security Risk Assessment & Threat Modeling - 2 Application Security Threat Modeling - Critical in identifying potential attack scenarios Identified Trust Boundaries for the in-scope Web Apps Extremely useful for Code Reviews, Security Testing and Application Security Documentation we45’s Security Experts perform Threat Modeling based on Microsoft’s renowned STRIDE Methodology
  • 8. we45 Web Application Security Testing Hybrid Methodology - Automated and Manual Web Application Security Testing for target application Apart from commercial and open source assessment tools, we45’s Security Experts developed special scripts and tools to identify Security Flaws Security Flaws assessed - OWASP Top 10, WASC Security Flaws, SANS Top 25, CERT-US Secure Coding Guidelines Security Flaws for Web Services - evaluated in detail.
  • 10. A Few Key Findings.... Deep-seated Injection Flaws in several sections of the application Utilized specialized Injection attacks to gain access to backend database Enumerated users and hashed passwords, including admin and DB users Utilized Password cracking techniques to crack password hashes Web Services Flaws Unauthenticated Access to critical web services Lack of Authorization checks and controls Deep-seated issues identified with the REST Interfaces
  • 11. Review & Presentation Findings presented to Developers, Project Managers and CTO Findings were explained in detail by we45’s Security Experts Findings were prioritized and agreements on remediation were reached
  • 12. Analysis & Reporting we45 prepared a detailed Security Risk Assessment and Code Review Report Report was ranked by severity of findings. Findings were referenced with Industry metrics like CWE, CVE and so on. Examples were provided as code- snippets with line number information Multiple Recommendations and Remediation Strategies were provided Executive Summary and Action Plan prepared for Management Action
  • 13. Results & View into the Future Results: With we45’s support, client was able to remediate all the security flaws with the application Enhanced Security through implementation of a Secure Software Development Lifecycle. The Client was awarded by their industry peers for Security Practices and Security Initiatives The Future: we45 is the trusted Application Security Partner for this client we45 also provides detailed product security consulting for the client’s products
  • 14. we45‘s Web Application Security Solutions Web Application Vulnerability Assessment and Penetration Testing Secure Software Development Lifecycle Implementation and Consulting Application Security - Code Review and Walkthroughs Web - Product Security Consulting and Design