COOKIE POLICY

PENTEST-ONLINE.COM uses technical, analytical, session and advertising cookies in order to provide a better service. However, we need your explicit consent to use them. You can also change the cookie settings or obtain more information here .

WHITE BOX

External and internal attack

Product information

Pentesting Service: Comprehensive Evaluation with Full Access (White Box)

What is a White Box Test?

This service combines internal and external attack simulations with full system access, providing an exhaustive evaluation of your website or API's security. The goal is to identify vulnerabilities from every angle, replicating realistic attack scenarios from actors with full or partial access.


Why Choose Our White Box Pentesting Service?

1. Report valid for official audits

Our report meets the requirements for:

  • Internal and external audits.
  • Security certifications and compliance with standards like ISO 27001, GDPR, ENS, or PCI DSS.

The report includes:

  • Detailed evidence and clear descriptions.
  • Prioritization of vulnerabilities based on criticality.
  • Actionable recommendations to enhance security.

2. Advanced simulation of internal and external attacks

We simulate realistic attacks from all perspectives:

  • External actors: With no prior access to the system.
  • Internal actors: With full access, including credentials, source code, and architecture.

Our methodology:

  • Automated testing to identify common vulnerabilities.
  • Manual evaluation to uncover weaknesses across all system layers.

3. Adaptable analysis for any environment

Regardless of your technology stack, our analysis is compatible with:

  • Languages: PHP, Java, Python, C#, Node.js, Ruby.
  • Frameworks: Django, Laravel, Spring, Express.js.
  • CMS platforms: WordPress, Joomla, Drupal, Magento.
  • APIs: REST, GraphQL, SOAP.
  • Infrastructure: Cloud, hybrid, or on-premises setups.

4. Comprehensive coverage

We detect critical vulnerabilities, including:

  • Authentication and authorization: Issues with access and permission management.
  • Privilege escalation: Identification of paths to gain administrative control.
  • SQL Injection and XSS: Database and script exploits.
  • Configuration errors: Misconfigured CORS policies, HTTP headers, and more.
  • Source code evaluation: Detection of insecure practices or critical errors.

5. Delivery within 72 hours

In just three days, you’ll receive a complete report, ready to share with your technical or management teams.


Key Benefits for Your Organization

  • Total system coverage: Identify internal and external vulnerabilities for comprehensive protection.
  • Defense against extreme scenarios: Evaluate your system’s ability to withstand even the most sophisticated attacks.
  • Quality improvement: Receive recommendations to strengthen your code and configurations.
  • Regulatory compliance: Align with the most recognized security standards.
  • Comprehensive report: Includes visual evidence, technical descriptions, criticality levels, and actionable steps.

What’s Included in Your Report?

  • Clear and technical descriptions of detected vulnerabilities.
  • Visual evidence and explanations of their impact.
  • Prioritization by level of criticality.
  • Detailed, actionable recommendations for mitigation.

Ensure total protection for your organization from all angles.
Order our White Box Pentesting service and receive an official report designed to enhance your system’s security and meet industry standards.

Guaranteed delivery within 72 hours.

+281 Vulnerabilities

+281 Vulnerabilities
NAME
GRAVITY
CLASSIFICATIONS
OS command injection
High
SQL injection
High
SQL injection (second order)
High
ASP.NET tracing enabled
High
File path traversal
High
XML external entity injection
High
LDAP injection
High
XPath injection
High
XML injection
Medium
ASP.NET debugging enabled
Medium
Broken Access Control
Information
HTTP PUT method is enabled
High
Out-of-band resource load (HTTP)
High
File path manipulation
High
PHP code injection
High
Server-side JavaScript code injection
High
Perl code injection
High
Ruby code injection
High
Python code injection
High
Expression Language injection
High
Unidentified code injection
High
Server-side template injection
High
SSI injection
High
Cross-site scripting (stored)
High
HTTP request smuggling
High
Client-side desync
High
Web cache poisoning
High
HTTP response header injection
High
Cross-site scripting (reflected)
High
Client-side template injection
High
Cross-site scripting (DOM-based)
High
Cross-site scripting (reflected DOM-based)
High
Cross-site scripting (stored DOM-based)
High
Client-side prototype pollution
Information
JavaScript injection (DOM-based)
High
JavaScript injection (reflected DOM-based)
High
JavaScript injection (stored DOM-based)
High
Path-relative style sheet import
Information
Client-side SQL injection (DOM-based)
High
Client-side SQL injection (reflected DOM-based)
High
Client-side SQL injection (stored DOM-based)
High
WebSocket URL poisoning (DOM-based)
High
WebSocket URL poisoning (reflected DOM-based)
High
WebSocket URL poisoning (stored DOM-based)
High
Local file path manipulation (DOM-based)
High
Local file path manipulation (reflected DOM-based)
High
Local file path manipulation (stored DOM-based)
High
Client-side XPath injection (DOM-based)
Low
Client-side XPath injection (reflected DOM-based)
Low
Client-side XPath injection (stored DOM-based)
Low
Client-side JSON injection (DOM-based)
Low
Client-side JSON injection (reflected DOM-based)
Low
Client-side JSON injection (stored DOM-based)
Low
Flash cross-domain policy
High
Silverlight cross-domain policy
High
Content security policy: allowlisted script resources
Information
Content security policy: allows untrusted script execution
Information
Content security policy: allows untrusted style execution
Information
Content security policy: malformed syntax
Information
Content security policy: allows clickjacking
Information
Content security policy: allows form hijacking
Information
Content security policy: not enforced
Information
GraphQL endpoint found
Information
GraphQL endpoint discovered
Information
GraphQL introspection enabled
Low
GraphQL suggestions enabled
Low
GraphQL content type not validated
Low
Cross-origin resource sharing
Information
Cross-origin resource sharing: arbitrary origin trusted
High
Cross-origin resource sharing: unencrypted origin trusted
Low
Cross-origin resource sharing: all subdomains trusted
Low
Web cache deception
Medium
Cross-site request forgery
Medium
SMTP header injection
Medium
JWT signature not verified
High
JWT none algorithm supported
High
JWT self-signed JWK header supported
High
JWT weak HMAC secret
High
JWT arbitrary jku header supported
High
JWT arbitrary x5u header supported
High
Cleartext submission of password
High
External service interaction (DNS)
Information
External service interaction (HTTP)
High
External service interaction (SMTP)
Information
Referer-dependent response
Information
Spoofable client IP address
Information
User agent-dependent response
Information
Password returned in later response
Medium
Password submitted using GET method
Low
Password returned in URL query string
Low
SQL statement in request parameter
Medium
Cross-domain POST
Information
ASP.NET ViewState without MAC enabled
High
XML entity expansion
Medium
Long redirection response
Information
Serialized object in HTTP message
High
Duplicate cookies set
Information
Input returned in response (stored)
Information
Input returned in response (reflected)
Information
Suspicious input transformation (reflected)
Information
Suspicious input transformation (stored)
Information
Request URL override
Information
Vulnerable JavaScript dependency
Low
Open redirection (reflected)
Low
Open redirection (stored)
Medium
Open redirection (DOM-based)
Low
Open redirection (reflected DOM-based)
Low
Open redirection (stored DOM-based)
Medium
TLS cookie without secure flag set
Medium
Cookie scoped to parent domain
Low
Cross-domain Referer leakage
Information
Cross-domain script include
Information
Cookie without HttpOnly flag set
Low
Session token in URL
Medium
Password field with autocomplete enabled
Low
Password value set in cookie
Medium
File upload functionality
Information
Frameable response (potential Clickjacking)
Information
Browser cross-site scripting filter disabled
Information
HTTP TRACE method is enabled
Information
Cookie manipulation (DOM-based)
Low
Cookie manipulation (reflected DOM-based)
Low
Cookie manipulation (stored DOM-based)
Low
Ajax request header manipulation (DOM-based)
Low
Ajax request header manipulation (reflected DOM-based)
Low
Ajax request header manipulation (stored DOM-based)
Low
Denial of service (DOM-based)
Information
Denial of service (reflected DOM-based)
Information
Denial of service (stored DOM-based)
Low
HTML5 web message manipulation (DOM-based)
Information
HTML5 web message manipulation (reflected DOM-based)
Information
HTML5 web message manipulation (stored DOM-based)
Information
HTML5 storage manipulation (DOM-based)
Information
HTML5 storage manipulation (reflected DOM-based)
Information
HTML5 storage manipulation (stored DOM-based)
Information
Link manipulation (DOM-based)
Low
Link manipulation (reflected DOM-based)
Low
Link manipulation (stored DOM-based)
Low
Link manipulation (reflected)
Information
Link manipulation (stored)
Information
Document domain manipulation (DOM-based)
Medium
Document domain manipulation (reflected DOM-based)
Medium
Document domain manipulation (stored DOM-based)
Medium
DOM data manipulation (DOM-based)
Information
DOM data manipulation (reflected DOM-based)
Information
DOM data manipulation (stored DOM-based)
Information
CSS injection (reflected)
Medium
CSS injection (stored)
Medium
Client-side HTTP parameter pollution (reflected)
Low
Client-side HTTP parameter pollution (stored)
Low
Form action hijacking (reflected)
Medium
Form action hijacking (stored)
Medium
Database connection string disclosed
Medium
Source code disclosure
Low
Backup file
Information
Directory listing
Information
Email addresses disclosed
Information
Private IP addresses disclosed
Information
Social security numbers disclosed
Information
Credit card numbers disclosed
Information
Private key disclosed
Information
Robots.txt file
Information
Json Web Key Set disclosed
Information
JWT private key disclosed
High
Cacheable HTTPS response
Information
Base64-encoded data in parameter
Information
Multiple content types specified
Information
HTML does not specify charset
Information
HTML uses unrecognized charset
Information
Content type incorrectly stated
Low
Content type is not specified
Information
TLS certificate
Medium
Unencrypted communications
Low
Strict transport security not enforced
Low
Mixed content
Information
Hidden HTTP 2
Information
Extension generated issue
Information
BCheck generated issue
Information

Report

Sample report

Process

The process

WHITE BOX
PENETRATION
TESTING

All inclusive
599€
Enviado correctamente.

Gracias por confiar en Q2BStudio