Our team can manually analyze the target web application or web service for up to 8 hours using Fortify on Demand’s testing methodology to augment the WebInspect scan results with advanced, targeted penetration testing. Our experts conduct an in-depth examination of the application’s authentication scheme, session management, access control, and a review for logical flaws and faulty developer assumptions. They identify vulnerabilities that can only be detected through human intervention, including, but not limited to: • The ability to harvest user accounts • Bypassing multi-step authentication • Password reset flaws • Accessing other users’ data or sensitive content • Horizontal or vertical privilege escalation • Skip key transaction steps such as shopping cart payments • Abuse of discount or business limit restrictions • Unique business logic flaws due to faulty developer assumptions
CONNECT with the Fortify Online Community: https://community.microfocus.com/t5/Fortify/ct-p/fortify - Connect with peers and share your knowledge - Find solutions and answers to your technical questions - Stay informed on new releases and product enhancements - Access downloads, demos, videos and support tips