We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Technology

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Is a Web Application Penetration Test?

By Jeremy Laukkonen
Updated: May 17, 2024
Views: 5,505
Share

A web application penetration test is an activity designed to gauge how an Internet-based program would behave during an attack or exploit. These tests make use of a variety of software programs to scan an application and then perform different actions that might occur during an actual attack. A web application penetration test can be performed by a development team or a third-party service provider. If an outside provider is used, the development team or information technology (IT) staff will sometimes not be notified of the test by the management. This may allow a web application penetration test to uncover flaws that might have otherwise gone unnoticed, which can allow those issues to be fixed prior to the release of the software.

Web applications are software packages that can be accessed and ran over the Internet. These applications can perform many functions, and in some cases they are responsible for handling data that is considered private or even valuable. In order to avoid compromising attacks, penetration tests are typically performed to locate any weaknesses or easily exploited areas in the code.

Typical web application penetration tests begin with an information gathering phase. The purpose of this step is to determine as much information about the application as possible. By sending requests to the application, and using tools such as scanners and search engines, it is often possible to obtain information such as software version numbers and error messages that are often used to find exploits later on.

After a sufficient amount of information has been accumulated, the next goal of a web application penetration test is to perform a number of different attacks and exploits. In some cases, the information gathered during the first phase will identify exploits the application might be vulnerable to. If no obvious vulnerabilities were detected, then a full range of attacks and exploits can be attempted.

Many different technical vulnerabilities can be located by a web application penetration test. These tests will typically attempt to use methods such as universal resource locator (URL) manipulation, session hijacking and structured query language (SQL) injection to break into an application. There may also be an attempt to initiate a buffer overflow or other similar actions that can cause an application to behave abnormally. If any of these attacks or exploits causes the application to reveal sensitive data to the penetration tester, the flaws are typically reported along with a suggested course of action.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Editors' Picks

Discussion Comments
Share
https://www.wisegeek.net/what-is-a-web-application-penetration-test.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.