Application Security

Find the flaws before attackers do.

Our CREST-certified testers conduct thorough web application penetration tests, assessing your application's business logic and exposure to OWASP Top 10 vulnerabilities, including injection, broken authentication, and access control flaws.

What we offer

Application security, done properly.

OWASP-Aligned Testing

Every assessment is structured around the OWASP Top 10, ensuring comprehensive coverage of the most critical web application security risks.

Manual-Led Approach

We go beyond automated scanning. Our testers combine manual techniques with automated tooling to probe application logic, authentication flows, and business processes for real-world exploitable flaws.

Clear Deliverables

Findings mapped to OWASP with CVSS and CWE classifications, proof-of-concept exploits, and actionable remediation steps your developers can act on immediately.

Scope

Areas we can test.

Authentication & Session Management
Login brute-force protections, session token randomness, cookie security flags, and multi-factor authentication bypass.
Injection Vulnerabilities
Database, code, and HTML injection across all input vectors, testing for injection points that could allow an attacker to manipulate queries, execute commands, or alter page content.
Broken Access Control
Horizontal and vertical privilege escalation, insecure direct object references (IDOR), and missing function-level access control.
Cross-Site Scripting (XSS)
Reflected, stored, and DOM-based XSS vulnerabilities across the application including third-party integrations.
Business Logic Flaws
Price manipulation, workflow bypass, rate limiting weaknesses, and application-specific logic vulnerabilities unique to your platform.
API Security
REST and GraphQL API endpoint testing including authentication, authorisation, input validation, and rate limiting.
File Upload & Processing
Malicious file upload, path traversal, and server-side request forgery (SSRF) vulnerabilities.
Security Misconfiguration
HTTP security headers, verbose error messages, directory listing, and insecure default configurations.
How we work

Our methodology.

Step 01

Scoping

Defining the test scope, authentication requirements, and user roles, supported by the available application documentation.

Step 02

Reconnaissance

Application crawl to enumerate endpoints, inputs, API calls, and authentication mechanisms before testing begins.

Step 03

Testing

Automated and manual testing to identify vulnerabilities across severity classes and identify chaining opportunities to form real-world attack paths.

Step 04

Reporting

Findings delivered within agreed SLAs with CVSS scores, CWE classifications, PoC evidence, and remediation guidance tailored to your tech stack.

What you receive

Your deliverables.

01

Penetration Test Report

A single report covering executive summary, technical findings with CWE classifications and CVSS scores, proof-of-concept evidence, and prioritised remediation guidance.

02

Findings Debrief

A walkthrough of the results with your technical team, covering key findings, risk context, and remediation priorities, with time for questions.

03

Ongoing Support

Post-engagement support from the Illume team to answer questions about findings and remediation guidance.

FAQ

Frequently asked questions.

What does a web application penetration test cover?
A web application penetration test covers the full OWASP Top 10, including injection vulnerabilities, broken access control, cross-site scripting, authentication and session management flaws, security misconfigurations, and business logic vulnerabilities. We also test API endpoints (REST and GraphQL), file upload handling, and third-party integrations. Testing is manual-led, meaning our consultants go beyond automated scanning to find vulnerabilities that tools miss.
What is OWASP Top 10 testing?
The OWASP Top 10 is a widely recognised list of the most critical web application security risks, maintained by the Open Web Application Security Project. Testing against the OWASP Top 10 means systematically assessing your application for these categories of vulnerability. The latest 2025 edition covers:
  • Broken Access Control
  • Security Misconfiguration
  • Software Supply Chain Failures
  • Cryptographic Failures
  • Injection
  • Insecure Design
  • Authentication Failures
  • Software or Data Integrity Failures
  • Security Logging and Alerting Failures
  • Mishandling of Exceptional Conditions
Do you test APIs as well as web applications?
Yes. API testing is a core part of our web application assessments. We test both REST and GraphQL endpoints for authentication and authorisation flaws, input validation issues, rate limiting weaknesses, and sensitive data exposure. If your application exposes an API, whether for mobile apps, third-party integrations, or single-page application backends, it is included in the scope.
Will testing disrupt our live application?
We work with you during scoping to agree testing windows and any areas to avoid. Testing is typically carried out against a staging environment where possible, but when production testing is required, our consultants take care to avoid disruptive actions such as mass data deletion or denial-of-service conditions. We maintain constant communication throughout the engagement.
Do we need to provide source code?
Not necessarily. Our assessments can be performed without access to source code. However, where source code is available, it can assist our testers in identifying issues more efficiently and understanding the logic behind the application, leading to a more thorough assessment.
Get Started

Ready to test your web application?

Speak to a CREST-certified consultant. We'll review your application, scope the engagement, and provide a fixed-price proposal.