Application Penetration Testing

Security assessments of web, mobile, desktop, and service-based applications across a range of platforms and architectures.

8
Service Types
OWASP
Aligned Methodology
Portal
Managed Delivery

Select a Service

Web Application

The Web Application Security Assessment evaluates the security posture of web-based applications and the logic, controls, and data flows that underpin them.

Web OWASP Top 10 Business Logic Authentication
View details →

Web Service / API

The Web Service / API Security Assessment evaluates the security posture of application programming interfaces (APIs) and web services that enable system-to-system and client-to-server interactions.

APIWeb Service
View details →

Android Application

The Android Application Security Assessment evaluates the security posture of applications developed for the Android platform, including their code, logic, and interaction with underlying systems and services.

Android Mobile APK Data Storage Reverse Engineering
View details →

iOS Application

The iOS Application Security Assessment evaluates the security posture of applications developed for the iOS platform, including their code, logic, and interaction with underlying systems and services.

iOS Mobile Keychain Entitlements IPA
View details →

Windows Desktop Application

The Windows Desktop Application Security Assessment evaluates the security posture of applications developed for the Windows desktop environment, including their code, execution context, and interaction with the operating system.

Windows Desktop .NET Win32 Registry
View details →

Thick Client

The Thick Client Security Assessment evaluates the security posture of client-side applications that operate with significant local processing and system interaction.

Thick Client Desktop Client-Server Protocol Memory
View details →

Binary Exploitation

The Binary Exploitation Security Assessment evaluates the security posture of compiled binaries and executable components to identify weaknesses that could be exploited at the machine-code or memory level.

Binary Low-Level Memory Safety Fuzzing Reverse Engineering
View details →

Code Review

The Code Review Security Assessment evaluates the security posture of application source code through systematic analysis of implementation and design choices.

Source Code Static Analysis Manual Review SAST Secure Coding
View details →
Portal Access
Detailed Reporting
Remediation Guidance
Direct Communication
Attestation Letters

All services are delivered subject to formal scoping, contractual agreement, and explicit authorisation.

Get in Touch

If you would like to discuss an assessment or understand how Nanorisk can support your organisation, please get in touch.