- Network Penetration Testing
- Web Application Penetration Testing
- Web Services Penetration Testing
- Android Apps Penetration Testing
- Android Apps Source Code Review
- Android Apps Reverse Engineering
- Software Penetration Testing
- Client-Side Penetration Testing
- Wireless Penetration Testing
- Appliance Penetration Testing
- Software Security Assessments
- Source Code Reviews
- Copy Protection / Licensing scheme
- DRM security assessments
Penetration Testing is a method used to evaluate the security of a network, web application, web service, and any other software system or device by simulating an attack in a controlled manner. The analysis is performed using different attacker profiles with little or no information about the systems under review.
Amplia Security Penetration Testing Methodology is the result of over 14 years of experience. We focus on manual testing of the systems which allows for the detection of logic flaws and complex vulnerabilities with the help of automated tools to obtain the best results in a time efficient manner.
Our methodology includes the following phases:
- Information gathering
- Vulnerability assessment
- Information Analysis
- Continuous Reporting
Our methodology is aimed at finding known and also previously unknown vulnerabilities using different techniques including reverse engineering, instrumentation, manual fault injection, automated fuzzing and the creation of custom tools / Proof-of-concept code.The deliverables for a Penetration Test include:
- Final Report containing an Executive Summary, Conclusions and General Recommendations, and a very detailed technical description of each of the issues found and possible solutions/workarounds (including proof-of-concept code when possible).
Penetration Testing is the best option to evaluate the security of a system using a reduced amount of time.
Source Code Reviews and security assessments in general consist in a more detailed and thorough examination of the security of a system and as a result take longer to perform.
Amplia Security Source Code Review methodology includes the following tasks:
- Manual inspection of the code
- Use of automated tools to identify common implementation errors and ‘suspicious’ code
- Verification of issues found by testing against the application / system when available
- Review of the application as a whole looking for logic flaws and other vulnerabilities
For more information or if you have special requirements please contact us at firstname.lastname@example.org.