Veracode’s Manual Penetration Testing

Test Type Methodology Vulnerabilities
Web Application/API OWASP Testing Guide OWASP Top 10/SANS Top 25
Mobile Application OWASP Mobile Security Testing Guide OWASP Mobile Top 10
Desktop or Thick-Client Application OWASP recommended testing guidance and best practices
  • Application Logic
  • Code Injection
  • Local Storage
  • Binary Exploitation and Reverse Engineering
  • Excessive Privileges
  • Unencrypted Storage of Sensitive Information
  • Unencrypted Transmission of Sensitive Information
  • Weak Encryption Implementations
  • Weak Assembly Controls
  • Weak GUI Controls
  • Weak or Default Passwords
Internet of Things (IoT) and Embedded Systems OWASP IoT Testing Guide and other industry best practices OWASP IoT Top 10
Infrastructure and Operations (DevOps Penetration Testing) PTES (Penetration Testing Execution Standard), NIST SP 800-115, PCI DSS 11.3 (for PCI engagements) Can vary depending on scope and rules of engagement