What We Do

What We Do

41% of data breaches are web application related (2018 Verizon Data Breach Report)


From Web-based email to online shopping, web applications bring us closer to our customers. While this provides convenience to both the business and customers, it also made it easier for cybercriminals to exploit them.

Identify business RISK not just vulnerability


The purpose of an assessment is not just to discover the technical vulnerability of the platform but to identify the potential impact for the business, suggesting remediation and consulting on the development processes in place. Knowing what you stand to lose and protect your asset accordingly.

Client Results


Our Framework


Identify

potential risks and security flaws within the web application’s context

Protect

Detect

vulnerabilities and implement remediation

Response

Consultation on best practice for secure software development processes

Recover

Red Team

Identify

potential risks and security flaws within the web application’s context

Protect

Detect

vulnerabilities and implement remediation

Response

Consultation on best practice for secure software development processes

Recover

Red Team

Our Approach


From common vulnerabilities to complex application logic, MXC team tests the protection, monitoring, and respons of your website(s) and application(s) – including:

  • Application logic: abuse of functionality and logical flaws
  • Authentication attacks: brute force, password validation and user enumeration
  • Authorisation: insufficient credential and session controls
  • Client-side attacks: XSS, content spoofing and HTTP splitting
  • Command execution: injection attacks and buffer overflow flaws
  • Upload functions: insufficient or ineffective input/output validation