There are several pressing issues when using a CMS. If a vulnerability exists in one CMS,anyone making use of that particular CMS can be abused. Most common attack surface exist as mentioned below:
Using Outdated Version of the CMS
Using Weak Credentials
Vulnerable Plugins/Add-ons
Misconfigurations
How it works?
Methodology
We have adopted a hybrid approach where we combine the OWASP methodology and build custom test cases around the business logic of an application that varies from application to application to ensure a thorough end to end security.
Gather the scope and prepare a project plan according to the requirements.
Reconnaissance
Build custom test cases around the business logic of the application and segregate them.
Build test cases
Identify low hanging vulnerabilities via scanners and validate the findings.
Deploy scanners
Perform an in-depth end to end pentesting and analyze the results.
Manual Penetration test
Compile the results into a comprehensive report.
Report generation
We offer exclusive security testing services for the following:
Concrete5
Dotnetnuke
Drupal
Joomla
Lefiray
Magento
Modx
Quickcms
Refinerycms
Shopify
Textpattern
Tinycms
Typo3
Umbraco
Vbulletin
Wordpress
Do you know?
50%
of the network access we achieved was through outdated versions and default credentials.
50%
of the network access we achieved was through outdated versions and default credentials.
50%
of the network access we achieved was through outdated versions and default credentials.
Want a quick web application
assessment?
By failing to prepare, you are preparing to fail.
Simulate modern & sophisticated cyber attacks related to COVID and enable your team to defend your organization