Penetration Testing

Penetration tests check the effectiveness of a client's security policies by launching a mock attack in the way that a hacker would do in order to see if it is possible to access the network. Tests vary in terms of intensity, from merely an overview of the security environment up to a full hacking attempt. DSS penetration tests are able to reveal:

  • The ease with which data can be obtained from outside the network
  • Which information is at risk
  • The measures that are required in order to protect the assets

Only a real penetration test can simulate the effect that a determined hacker would have in the event that he attacked into an organization.


When conducting Black Box testing, DSS does not test the business logic of the web application or give thought to how vulnerabilities may impact the system's users. Black Box testing is useful, however, for identifying the OWASP top ten vulnerabilities. Tests are conducted against the external application and a blind test is assured because DSS does not use credentials to test the application.

Black Box Testing

A penetration test is conducted without providing the client's source of information on the composition and state of the object. The contractor selects the format for the test, closely mimicking the actions of a real hacker.

  • A Black Box Web Application Security Assessment incorporates 70% automated tools with 30% manual techniques
  • Black Box Web Application Security Assessments expose many of the OWASP Top 10 Vulnerabilities, including SQL Injection and Cross-Site Scripting (XSS)

White Box Testing

The testing process may be coordinated, with partial disclosure of the test object to the customer (software, hardware, network performance, and data concerning key personnel).

  • The test can be run using two common scenarios:
    • Internal

      whereby the system is audited from within the organization. Depending on the size of the organization and the IP address ranges, among other matters, the test typically takes a team of two employees between seven and twelve business days. The client's offices are visited each day, sniffing and penetration testing the system; giving the testers the same access that regular employees of the firm have. If asked to do so, the testers can attempt to gain access to the company's financial department or other resources, as specified.


      the company's infrastructure and/or web application is appraised in order to mimic a former employee attempting to gain access. The former employee could be presumed to have prior knowledge of the application and the organization's resources. The testers will learn the application, study software documentation and meet with developers in order to maximize the effectiveness of the test.


With more than ten years experience of testing client's Web Application Security (WAS), DSS has developed a detailed and structured methodology based on OWASP when carrying out WAS assessments. By getting into the mindset of a hacker, DSS sets out to exploit vulnerabilities and mis-configurations in the application. This is the optimal way in which to conduct web application testing.

Find out more about what we do

The company is currently developing a system to combat international cyber crime, which will equip the law enforcement authorities in any jurisdiction to effectively tackle the problem of computer-based malfeasance. Crucially, the technology assists at the most problematic stages of the criminal investigation, including the assemblage of evidence, DDoS protection and web auditing.