Web Application Penetration Testing Methodology
Review Cobalt pentest methodologies for web applications, including microservices.
Cobalt pentesters follow specific methodologies for different types of assets.
By default, our pentesters test for industry standard vulnerabilities from:
For more information on how we pentest, refer to the detailed pages associated with your asset.
In most cases, the Methodology is fixed, based on the Asset Type you defined earlier. However, if you selected a combined asset type, such as Web + API, you can limit the test to either of the individual methodologies:
Review the methodology for your asset, from the links shown earlier. Each methodology includes default requirements based on standards such as:
You’re welcome to include additional requirements.
Next, you’ll want to set up and share Test Credentials for your pentesters.
Review Cobalt pentest methodologies for web applications, including microservices.
Review methodologies for APIs. Includes microservices.
Review Cobalt pentest methodologies for mobile applications.
Review Cobalt pentest methodologies for internal networks.
Review Cobalt pentest methodologies for external networks (includes instances of Microsoft Office 365).
Review methodologies for Cloud Configurations.
Review Cobalt pentest methodologies for Azure Active Directory.
Review Cobalt pentest methodologies for desktop applications.