Web application testing
OWASP Top 10 + WSTG-aligned testing of web applications. Authentication, authorization, session management, input validation, business-logic flaws, third-party library exposure. Black-box, grey-box, or white-box per scope.
Vulnerability assessment and penetration testing across web applications, mobile apps, APIs, infrastructure, and cloud. Aligned to OWASP Top 10, PTES, CERT-In empanelment guidelines, and ISO 27001 Annex A.8.8 / A.8.29 evidence requirements.
VAPT (Vulnerability Assessment and Penetration Testing) is the technical security testing layer that sits beneath ISO 27001 and underpins regulatory expectations from RBI, SEBI, IRDAI, CERT-In, and increasingly the DPDP Act. We deliver VAPT across five target categories — web applications, mobile (Android + iOS), APIs, network infrastructure, and cloud configuration — with deliverables formatted for CB Stage 2 audit evidence, RBI / SEBI submission, customer audit response, or internal stakeholder readiness.
Engagements are fixed-price per scope, delivered with a documented methodology (OWASP Web Security Testing Guide, OWASP MASTG for mobile, PTES for network, and cloud configuration benchmarks). The report is technical-but-readable: every finding ranked by CVSS, reproduction steps, remediation guidance, and an executive summary that a CISO can share with the board.
We bundle VAPT into our ISO 27001 engagements for consistency at Stage 2 audit, but VAPT runs equally as a standalone service — common drivers are RBI / SEBI annual testing requirements, customer audit responses, or pre-launch security validation for product releases.
Six explicit scope areas — what you can expect, end to end, on a typical engagement.
OWASP Top 10 + WSTG-aligned testing of web applications. Authentication, authorization, session management, input validation, business-logic flaws, third-party library exposure. Black-box, grey-box, or white-box per scope.
OWASP MASTG-aligned mobile testing. Local storage, transport security, code obfuscation, jailbreak/root detection, deep links, IPC, certificate pinning, and reverse-engineering resistance. APK/IPA review + dynamic runtime testing.
OWASP API Security Top 10 — broken authorization, mass assignment, rate limiting, security misconfiguration, BOLA / BFLA. REST, GraphQL, gRPC. Documented endpoints + discovery for undocumented surface.
Internal and external infrastructure VAPT — host enumeration, service-level vulnerability scanning, exploit verification (ethical), privilege escalation, lateral movement. PTES-aligned methodology. Includes Active Directory and segmentation testing.
AWS / Azure / GCP configuration benchmarks against CIS, vendor-published baselines, and your own policy. IAM analysis, public-exposure scanning, encryption posture, logging adequacy, separation between environments.
Every finding ships with reproduction steps, screenshot evidence (responsibly redacted), CVSS v3.1 score, and concrete remediation guidance. Re-test of remediated findings included as standard — no surprise add-on cost.
From kickoff to handover. Senior lead auditor accountable end to end.
Scope workshop: targets, IP ranges, in-scope vs out-of-scope, test windows, escalation paths, customer authorization letters. Rules of Engagement document signed by both sides before any testing begins.
Reconnaissance, vulnerability identification, exploit verification (ethical, non-destructive). Daily standup with your security team. Critical findings reported live, not at end-of-engagement.
Technical report (per-finding) + executive summary (board-level). Joint readout call with your team to walk through every finding, answer questions, and align on remediation priority. Report ships in PDF + structured CSV/JSON for ticketing import.
After your team remediates, we re-test every finding marked 'fixed' — verify the fix, validate no regression. Final clean report issued for stakeholder distribution (CB audit, customer, regulator, board).
Concrete artefacts handed over at engagement close — not slides, not summaries.
Same service. Different control emphasis, different audit scrutiny.
RBI Cyber Framework annual testing requirement, payment card environment scope, NPCI vendor expectations. Reports formatted for RBI / NPCI submission and board reporting.
Mobile + web + API combined scope, PCI DSS scope-overlap testing, KYC/eKYC flow validation, transaction integrity testing. Often quarterly cadence.
Pre-launch security validation, annual penetration testing for SOC 2 Type II + ISO 27001 evidence, customer-requested testing per enterprise procurement asks.
Client-specific testing per customer contract, customer audit response support, secure transmission validation for sensitive data flows.
Fixed-price wherever scope is well-defined; T&M or retainer where ongoing work needs flexibility.
One web app, one mobile platform, or one API surface. Fixed-price ₹35K–₹1.0L depending on complexity, authentication tiers, and business logic surface.
Web + mobile (iOS+Android) + API + cloud configuration for a single product. Fixed-price ₹1.2L–₹2.5L. Most common engagement size for fintech / SaaS.
Internal + external network VAPT, AD + segmentation testing, cloud configuration review, multi-site. ₹2.0L–₹3.5L. Suitable for banks, large SaaS, regulated entities.
Vulnerability assessment is broad-and-shallow — automated scanning + manual review to identify potential weaknesses. Penetration testing is narrow-and-deep — ethical exploitation to demonstrate real-world impact and prove which findings are exploitable in your environment. We deliver both as a single engagement: VA gives you breadth, PT gives you proof. Reports rank findings by exploitability, not just CVSS, because regulators and auditors care about the difference.
Yes for RBI Cyber Framework annual testing requirements (banks, NBFCs, PSPs) and SEBI CSCRF expectations. CERT-In requires testing performed by CERT-In empanelled auditors for specific use cases — we coordinate with CERT-In empanelled testing partners on request for those scenarios.
No — non-destructive testing is the default, and we agree the rules of engagement explicitly before testing begins. For high-risk targets (production payment systems, live trading platforms), we test in staging environments or schedule low-traffic windows. We never run automated brute-force or denial-of-service tests in production without explicit authorization.
Single web application: 1–2 weeks. Combined web + mobile + API: 3–4 weeks. Network + infrastructure VAPT: 2–4 weeks. Add 1 week for report delivery and 1 week for re-test cycle. Total typical engagement window 4–8 weeks.
Yes — re-test of every finding your team marks 'fixed' is included as standard. We verify the fix, confirm no regression, and re-issue a clean-state report after closure. No surprise add-on cost.
Yes. Post re-test, we issue an attestation letter summarizing scope, methodology, dates of testing, and final remediation state. This is what most enterprise customers ask for in vendor security questionnaires — readable to procurement / GRC teams without exposing the full technical detail.
Yes — and it's our recommended approach. ISO 27001 Annex A.8.8 (vulnerability management) and A.8.29 (security testing) effectively require periodic technical testing. Bundling VAPT into the ISO 27001 engagement gives the CB Stage 2 auditor consistent evidence from one supplier. Standalone VAPT also works fine if you already have ISMS in place.
Critical findings (CVSS ≥ 9.0 or active exploitation pathways) are reported within 24 hours of confirmation — not at end of engagement. Reported via signed communication to a named recipient. We pause testing in the affected area while your team contains. Engagement resumes once the immediate exposure is controlled.
Tell us your target scope (web / mobile / API / network / cloud), authentication model, and reporting deadline. We come back with a fixed-price proposal and a 4–8 week schedule.