Services
Network Penetration Testing
Web Application Penetration Testing
Web Services Penetration Testing
Android/iOS Apps Penetration Testing
Android/iOS Apps Source Code Review
Android/iOS Apps Reverse Engineering
Software Penetration Testing
Client-Side Penetration Testing
Wireless Penetration Testing
Appliance Penetration Testing
Software Security Assessments
Source Code Reviews
Copy Protection / Licensing scheme
DRM security assessments
Penetration Testing is a method used to evaluate the security of a network, web application, web service, and any other software system or device by simulating an attack in a controlled manner. The analysis is performed using different attacker profiles with little or no information about the systems under review.
Amplia Security Penetration Testing Methodology is the result of over 14 years of experience. We focus on manual testing of the systems which allows for the detection of logic flaws and complex vulnerabilities with the help of automated tools to obtain the best results in a time efficient manner.
Our methodology includes the following phases:
Information gathering
Vulnerability assessment
Information Analysis
Exploitation
Continuous Reporting
Our methodology is aimed at finding known and also previously unknown vulnerabilities using different techniques including reverse engineering, instrumentation, manual fault injection, automated fuzzing and the creation of custom tools / Proof-of-concept code.
The deliverables for a Penetration Test include:Final Report containing an Executive Summary, Conclusions and General Recommendations, and a very detailed technical description of each of the issues found and possible solutions/workarounds (including proof-of-concept code when possible).
Penetration Testing is the best option to evaluate the security of a system using a reduced amount of time.
Source Code Reviews and security assessments in general consist in a more detailed and thorough examination of the security of a system and as a result take longer to perform.
Amplia Security Source Code Review methodology includes the following tasks:
Manual inspection of the code
Use of automated tools to identify common implementation errors and ‘suspicious’ code
Verification of issues found by testing against the application / system when available
Review of the application as a whole looking for logic flaws and other vulnerabilities
For more information or if you have special requirements please contact us at info@ampliasecurity.com.