🛡️ Sherlocked Security – Web Application Security Assessment
Proactively Secure Your Web Applications Before They Become a Breach Vector
📄 1. Statement of Work (SOW)
Service Name: Web Application Security Assessment
Client Type: SaaS, FinTech, eCommerce, Government, Startups
Service Model: Manual + Automated Penetration Testing
Compliance Coverage: OWASP Top 10, CWE, SANS 25, PCI-DSS, ISO 27001, SOC 2
Testing Types:
- Black Box
- Gray Box (with credentials)
- White Box (with source code access – optional)
🧠 2. Our Approach
🔹 Hybrid Testing: Manual + AI-Augmented
🔹 Risk-Driven, Business-Logic Focused
🔹 Developer-Friendly Remediation
[Discovery] → [Reconnaissance] → [Automated Scanning] → [Manual Testing] → [Exploitation] → [Risk Mapping] → [Reporting & Walkthrough] → [Retesting & Certification]
🧪 3. Methodology
[Project Kickoff] → [Asset Mapping] → [Threat Modeling] → [Attack Surface Analysis] → [Vulnerability Identification] → [Proof-of-Concept Exploitation] → [Risk Analysis & Reporting] → [Patch Verification] → [Signoff & Certification]
📦 4. Deliverables to the Client
- ✅ Vulnerability Risk Matrix Table
- 🧾 Statement of Work (SOW)
- 🧭 Methodology Document
- 📘 Technical Report including:
- Vulnerability Name
- Description
- Severity (CVSS v3.1)
- Likelihood & Impact
- Root Cause Analysis
- Reproducible PoC Screenshots
- Fix Recommendations
- References
- 📊 Risk Visualizations & Attack Path Diagrams
- 📽️ Live Report Walkthrough (Optional Call)
- 🧑💻 Developer Assistance on Patch Guidance
- 🔁 Revalidation & Retesting
- 🎓 Final Security Certificate (Post-Fix)
🤝 5. What We Need from You (Client Requirements)
For Gray Box Testing:
- ✅ URLs to staging/production environments
- ✅ User roles/credentials (Admin/User/Editor/etc.)
- ✅ API documentation (Swagger/Postman)
- ✅ Authentication mechanism details (OAuth, SSO, MFA)
- ✅ Access window/timings for testing
- ✅ Primary point-of-contact from Dev or Infra Team
- ✅ Whitelist our IPs if WAF/CDN is used
🧰 6. Tools & Technology Stack
- 🔍 Burp Suite Professional
- 🛠️ OWASP ZAP
- 🔁 Postman / Insomnia (API Testing)
- 🧱 Nuclei + Custom Templates
- 🧬 Nikto / Wfuzz / Dirsearch
- 🧠 AI-enhanced payload fuzzers
- 🔐 Gitleaks / TruffleHog (for secrets & repo analysis)
🚀 7. Engagement Lifecycle (Lead → Closure)
1. Discovery Call 2. Problem Scoping & Requirements 3. Proposal + NDA + SoW 4. PO/Contract & Project Kickoff 5. Testing Phase (1-2 Weeks Typical) 6. Draft Report → Review Call 7. Final Report Delivery 8. Revalidation (1 Free Round) 9. Final Certification + Support Handover
🌟 8. Why Sherlocked Security? (Our USP)
Feature | Sherlocked Advantage |
---|---|
🔍 Hybrid Testing | Manual + AI-powered recon & fuzzing |
🧠 Deep Business Logic Analysis | Goes beyond standard OWASP checks |
📘 Developer-Centric Reporting | Fix-focused, CVSS & CWE aligned |
🔁 Free Revalidation | 1 round included, extra at nominal cost |
🤝 Dev & Mgmt Engagement | Slack/Teams support during testing |
🏆 Security Certificate | Provided post revalidation and fix signoff |
📚 9. Real-World Case Studies
🛑 Attack in the Wild: IDOR in an eCommerce Giant
Issue: Predictable order IDs allowed full access to other users’ invoices.
Impact: 1.2M customers affected, ₹2.8 Cr penalty, brand damage.
🛠️ Our Fix Journey: HR SaaS Platform
Client: India-UK HRTech Startup
Findings:
- Persistent XSS via resume uploads
- Weak session tokens
Our Role: - Delivered patch-focused audit
- Assisted Dev team via Slack
Outcome: - Cleared ISO 27001 audit
- Signed long-term security retainer
🛡️ 10. SOP – Standard Operating Procedure
- Kickoff call
- Information collection & access setup
- Define scope (e.g., staging, production)
- Perform scanning (automated + custom tools)
- Perform manual testing & exploit attempts
- Send immediate alerts for critical findings
- Report draft delivery & feedback
- Final report with walkthrough
- Fix support (as needed)
- Retesting and final certification
📋 11. Sample Web App Security Checklist (Preview)
# ✅ Web Application Security Checklist (500+ checks total)
## Authentication & Session
- Weak password enforcement
- Session timeout issues
- No session invalidation post logout
- No rate limiting on login
## Access Control
- Insecure Direct Object Reference (IDOR)
- Bypass via parameter tampering
- Horizontal/vertical privilege escalation
## Input Validation
- Reflected/Stored XSS
- SQLi (classic, blind, time-based)
- Command Injection
- Path Traversal
## File Upload
- Upload shell using double extension
- SVG upload with script execution
- MIME type and magic bytes bypass
## API
- Missing authentication headers
- Unfiltered mass assignment
- Rate-limiting missing on sensitive endpoints
## Security Headers
- X-Frame-Options missing
- Content-Security-Policy misconfigured
- Strict-Transport-Security missing
## Business Logic
- Abuse of coupon codes
- Multiple reward generation
- Checkout flow manipulation
_Total Checks: 500+ across OWASP Top 10, CWE, API Sec, and Business Logic_
📬 Contact Us or 📅 Book a Consultation