Softomate Solutions logoSoftomate Solutions logo
I'm looking for:
Recently viewed
Web Application Penetration Testing for UK Businesses: What to Expect — Softomate Solutions blog

CYBER SECURITY

Web Application Penetration Testing for UK Businesses: What to Expect

9 May 202617 min readBy Softomate Solutions

What Does Web Application Penetration Testing Cover?

Web application penetration testing is a structured security assessment in which authorised testers simulate real-world attacks against your web application, API, or web service to identify vulnerabilities that could be exploited by malicious actors. Unlike automated vulnerability scanning, web application penetration testing uses human expertise to identify business logic flaws, chained attack paths, and context-specific weaknesses that tools cannot find.

The standard methodology for web application penetration testing in the UK is the OWASP (Open Web Application Security Project) Testing Guide, aligned with the OWASP Top 10 - the ten most critical security risks affecting web applications. The current OWASP Top 10 (2021) covers broken access control, cryptographic failures, injection vulnerabilities, insecure design, security misconfiguration, vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging failures, and server-side request forgery.

A professional web application penetration test conducted by a CREST or CHECK-approved provider covers significantly more than the OWASP Top 10 checklist. Our penetration testing service follows the full OWASP Testing Guide methodology, which defines over 100 specific test cases across eleven test categories.

What Test Categories Does a Web Application Pen Test Cover?

Understanding what testers actually examine during a web application penetration test helps UK businesses scope the engagement correctly and interpret findings accurately.

Authentication Testing

Authentication testing examines how your application verifies user identity. Testers check for weak password policies (do you enforce minimum length, complexity, and check against common password lists?), broken account lockout (can an attacker attempt unlimited password guesses without triggering a lockout?), username enumeration (does your login form reveal whether a username exists?), multi-factor authentication bypass (can MFA be skipped via API manipulation or by replaying valid session tokens?), and credential stuffing resistance.

Authentication failures are consistently the highest-severity findings in web application assessments for UK businesses. A login form that reveals "username not found" versus "incorrect password" tells an attacker which usernames are valid - a valuable first step in a targeted attack against your customers or staff.

Authorisation Testing

Authorisation testing examines whether users can access resources they should not. Insecure direct object references - where a URL like /account/12345/invoices can be manipulated to /account/12346/invoices to access another customer's data - are the most common critical finding in UK e-commerce and SaaS applications. Testers also check for privilege escalation (can a standard user perform administrative functions?), forced browsing (can URLs that should require authentication be accessed directly?), and function-level access control (are API endpoints protected by the same access controls as the UI?)

Authorisation vulnerabilities have direct UK GDPR implications. An insecure direct object reference that exposes customer personal data is a personal data breach under UK GDPR Article 4(12). Depending on the sensitivity of the data and the number of records potentially accessible, it may require notification to the ICO within 72 hours of discovery.

Session Management Testing

Session management testing examines how your application creates, maintains, and terminates user sessions. Testers check for session tokens that can be predicted or guessed, session tokens that are transmitted insecurely (via HTTP rather than HTTPS), sessions that persist indefinitely after logout, and cross-site request forgery (CSRF) vulnerabilities that allow attackers to perform actions on behalf of authenticated users without their knowledge.

Input Validation Testing

Input validation testing examines how your application handles user-supplied data. SQL injection - where malicious input is interpreted as database commands, potentially allowing an attacker to extract, modify, or delete all data in your database - is the classic input validation vulnerability. Testers also check for cross-site scripting (XSS), where malicious JavaScript is injected into pages viewed by other users; XML injection; header injection; and OS command injection.

SQL injection remains one of the most dangerous web application vulnerabilities despite being well-understood for over 20 years. A 2023 analysis by Positive Technologies found that 46% of web applications tested had SQL injection vulnerabilities. For UK businesses, a successful SQL injection attack against an application storing customer personal data constitutes a reportable breach under UK GDPR.

API Security Testing

API security testing has become a distinct and increasingly important discipline as UK businesses migrate functionality to REST and GraphQL APIs. The OWASP API Security Top 10 covers API-specific vulnerabilities including broken object level authorisation (effectively IDOR at the API level), broken authentication, excessive data exposure (APIs that return more fields than the client displays), rate limiting absent (APIs vulnerable to enumeration or resource exhaustion), and security misconfiguration in API gateways.

Many UK businesses have tighter security controls on their web front-end than their underlying API - because the API was built for speed rather than security, or because it predates the current security standards. A web application penetration test that does not include API testing may miss the most exploitable attack surface in your environment.

Business Logic Testing

Business logic testing is the area where human expertise most clearly exceeds automated scanning. Business logic flaws are vulnerabilities specific to how your application is designed to work: can a customer apply a discount code multiple times? Can a user manipulate the checkout flow to purchase items for zero or negative cost? Can a trial account access paid features by manipulating API requests? Automated scanners cannot identify these vulnerabilities because they require understanding of what the application is supposed to do.

What Are the Different Types of Web Application Pen Test?

Web application penetration tests are classified by the information provided to the tester before the engagement begins. Understanding the three test types allows UK businesses to select the right approach for their objectives.

Black Box Testing

In a black box test, the tester receives no prior information about the application other than the target URL. They have the same starting point as an external attacker with no inside knowledge. Black box testing is the most realistic simulation of an opportunistic external attack but is the least efficient use of testing time, as significant effort is spent on reconnaissance that does not find vulnerabilities. Black box testing is appropriate for assessing what an opportunistic attacker can find, but typically produces fewer actionable findings per testing day than grey or white box approaches.

Grey Box Testing

Grey box testing provides the tester with partial information: typically user credentials for one or more application roles, and sometimes basic application documentation. Grey box testing simulates an attacker who has obtained a valid user account (via phishing or credential purchase on the dark web) and is attempting to escalate privileges or access other users' data. This is the most common approach for UK commercial web application testing because it balances realistic threat simulation with testing efficiency.

White Box Testing

White box testing provides the tester with full information: application source code, architecture diagrams, API specifications, and developer credentials. Testers can review code paths directly and design test cases for specific functions rather than discovering the attack surface through reconnaissance. White box testing is the most efficient approach and typically surfaces the highest number of vulnerabilities per testing day, making it the best value for complex applications. It is the recommended approach when the objective is comprehensive vulnerability coverage rather than realistic attack simulation.

Authenticated Versus Unauthenticated Testing

Independent of the information-sharing model, web application tests can be conducted from an unauthenticated perspective (simulating a visitor with no account), an authenticated perspective (simulating a logged-in customer), an authenticated administrative perspective (simulating a compromised admin account), or all three. For applications with multiple user roles, testing each role separately significantly increases testing scope and cost but is necessary to identify role-specific vulnerabilities.

What Should a Web Application Pen Test Report Contain?

A professional web application penetration test report delivered by a CREST or CHECK-approved provider to a UK business should contain the following components. A report that omits any of these sections is incomplete and represents poor value for money.

The executive summary (one to two pages) translates technical findings into business risk language. It should be comprehensible to a non-technical director, state the overall risk rating clearly, summarise the most critical findings and their business impact, and state clearly whether any vulnerabilities found represent a current or imminent risk of personal data breach under UK GDPR. This is the section you share with your board.

The technical findings section lists each vulnerability in a consistent format: vulnerability name, CVSS risk score (0-10), affected URL or endpoint, description of the vulnerability, reproduction steps with evidence screenshots, business impact, and specific remediation guidance. CVSS scores are the Common Vulnerability Scoring System standard: 9.0 to 10.0 is Critical, 7.0 to 8.9 is High, 4.0 to 6.9 is Medium, 0.1 to 3.9 is Low.

The management summary provides an at-a-glance dashboard: total findings by severity, a risk heatmap, pass/fail status against OWASP Top 10 categories, and comparison to the tester's benchmark for applications of similar type and complexity.

The remediation priority matrix provides a sequenced remediation plan: which Critical and High findings should be addressed first, estimated remediation complexity, and guidance on interim mitigations that reduce risk while permanent fixes are developed.

The re-test scope clarifies which findings warrant a re-test after remediation. Critical and High findings should always be re-tested to confirm the fix is effective. Most CREST-approved providers include a re-test for Critical and High findings within the original engagement cost, or offer it at a reduced rate.

How Do You Scope a Web Application Penetration Test?

Accurate scoping is the most important factor in getting value from a web application penetration test. Scoping errors in either direction - too narrow or too broad - reduce the value of the engagement. Here is how to scope a web application pen test accurately for a UK business.

Identify and count all entry points to the application. An entry point is any URL, API endpoint, or parameter that accepts user-controlled input. For a simple e-commerce site, entry points include the search function, product filter parameters, checkout form fields, account registration and login, and account management functions. For a complex SaaS application with a REST API, the number of entry points may be in the hundreds.

Identify all authenticated user roles. A SaaS application with a free tier, a paid customer tier, and an administrator role requires three sets of test credentials and testing of each role's accessible functionality. Each additional role adds approximately 20 to 30% to the testing scope.

Identify all API endpoints. Provide the tester with API documentation (Swagger/OpenAPI specification, Postman collections) if available. If the API is undocumented, the tester will need to discover endpoints during the test, which consumes time that would otherwise be spent testing.

Identify any out-of-scope systems. Third-party payment processors, cloud service provider infrastructure, and shared hosting environments that you do not own and cannot authorise testing against must be explicitly excluded from scope. Testing systems you do not own without authorisation is an offence under the Computer Misuse Act 1990.

Our VAPT service includes a scoping call with a senior CREST-certified tester before every engagement to ensure the scope reflects your actual application architecture, your UK GDPR obligations, and your testing objectives.

UK GDPR Implications of Vulnerabilities Found During Testing

Web application penetration testing frequently surfaces vulnerabilities that have UK GDPR implications. Understanding when a vulnerability becomes a reportable breach - and what your obligations are - is an important part of interpreting test results for UK businesses.

A penetration test finding is not, by itself, a personal data breach. The ICO's definition of a personal data breach under UK GDPR Article 4(12) requires that a security incident has occurred that leads to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data. A vulnerability that exists but has not been exploited does not meet this definition.

However, if the penetration tester exploits a vulnerability that provides access to real personal data (which should not happen if the test is conducted against a test environment with synthetic data - but sometimes happens when testing production systems), that exploitation may itself constitute a breach requiring notification to the ICO under Article 33.

The practical advice for UK businesses is: always conduct penetration testing against a test or staging environment populated with synthetic data rather than real customer data. If testing against a production environment is unavoidable (which is sometimes the case for applications with complex state that cannot be replicated in staging), establish in advance with your testing provider how personal data encountered during testing will be handled, and document that agreement in the testing contract.

Where testing reveals a vulnerability that has likely already been exploited by third parties - for example, evidence of SQL injection exploitation in server logs - the ICO notification obligation may already be triggered. A reputable penetration testing provider will make this clear in their report and can assist in preparing an ICO notification if required.

How Do You Choose a CHECK-Approved Penetration Testing Company?

The NCSC's CHECK scheme approves penetration testing companies to assess systems handling OFFICIAL and OFFICIAL-SENSITIVE UK government data. While CHECK approval is formally required only for government work, many UK private sector organisations - particularly those in regulated sectors or the government supply chain - require CHECK approval as a quality signal for commercial testing.

CREST (the Council of Registered Ethical Security Testers) is the equivalent private sector accreditation body. CREST-certified penetration testers have passed rigorous technical examinations and are subject to a professional code of conduct. PCI DSS version 4.0 explicitly requires that penetration testing be conducted by qualified internal resources or a qualified external third party, and CREST-certified providers are the recognised standard for external PCI DSS testing in the UK.

When selecting a web application penetration testing provider, verify the following. The individual tester conducting your test (not just the company) holds a current CREST Registered Web Application Tester (CRT) or equivalent qualification. The company is listed on the CREST member register or the NCSC CHECK approved company list. The company carries professional indemnity insurance of at least £1 million. The contract specifies the qualifications of the testers assigned to your engagement - some companies quote using senior testers and deliver using juniors.

Ask specifically what percentage of their web application testing work is manual versus automated. A test that is 90% automated scanning and 10% manual review costs the same as a fully manual test but delivers significantly fewer actionable findings. Professional web application penetration testing is a skilled manual activity; automated scanning is a commodity that you can purchase cheaply or conduct in-house.

What Does Web Application Pen Testing Cost for UK Businesses?

Web application penetration testing costs for UK businesses vary by application complexity, the number of user roles, whether the API is in scope, and whether authenticated testing of multiple roles is required. The following ranges reflect 2024 UK market rates for CREST-approved providers.

Small application with one to two user roles and a limited number of entry points (up to 50 parameters): £5,000 to £8,000 for a grey box test including re-test of Critical and High findings. This covers a typical small business web application, a simple SaaS product, or an e-commerce site with basic functionality.

Medium application with two to four user roles, a REST API, and moderate complexity (50 to 200 entry points): £8,000 to £15,000. This covers a typical mid-market SaaS application, a healthcare portal, or a financial services application with customer-facing functionality and an administrative back-end.

Complex application with four or more user roles, a large API surface (200+ endpoints), complex business logic, and payment processing: £15,000 to £25,000. This covers enterprise SaaS applications, high-traffic e-commerce platforms, and heavily customised web applications with complex workflow.

Annual web application penetration testing as part of a broader security programme, including external network testing and phishing simulation, is typically budgeted at £15,000 to £30,000 per year for a UK business with moderate web application complexity. This annual investment in proactive security testing compares favourably with the average cost of a web application breach: the IBM 2023 data indicates that web application breaches have the highest average cost of any initial attack vector at approximately £4.5 million globally.

Related Reading

Frequently Asked Questions

What is the OWASP Top 10 and why does it matter for UK businesses?

The OWASP Top 10 is a regularly updated list of the ten most critical security risks affecting web applications, published by the Open Web Application Security Project. It is the industry-standard reference for web application security and forms the baseline methodology for web application penetration testing globally, including in the UK. The current 2021 edition covers broken access control, cryptographic failures, injection, insecure design, security misconfiguration, vulnerable components, authentication failures, data integrity failures, logging failures, and server-side request forgery. UK businesses should understand the OWASP Top 10 because these are the vulnerability classes most likely to be exploited in attacks against their web applications.

What is the difference between a web application penetration test and a vulnerability scan?

A vulnerability scan uses automated tools to identify known weaknesses by matching your application's components against a database of known vulnerabilities. It is fast, inexpensive, and can be run frequently. A web application penetration test uses skilled human testers who use automated scanning as a starting point but apply professional judgement to identify business logic flaws, chained attack paths, and complex vulnerabilities that automated tools cannot find. PCI DSS requires both for businesses processing card payments. For UK businesses seeking assurance about their web application security, penetration testing provides substantially more value than vulnerability scanning alone.

Should web application pen testing be conducted against production or a staging environment?

Testing should be conducted against a staging or test environment populated with synthetic data whenever possible. Testing against production carries the risk of service disruption and, if the tester accesses real personal data, may constitute a personal data breach under UK GDPR. Some applications cannot be fully replicated in staging, in which case testing can be conducted against production with appropriate safeguards: out-of-hours testing windows, exclusion of destructive test cases, close coordination with the application team, and contractual agreement on handling any personal data encountered. Always discuss the testing environment with your provider before the engagement begins.

When does a vulnerability found in a pen test need to be reported to the ICO?

A penetration test finding does not, by itself, constitute a personal data breach requiring ICO notification. The UK GDPR breach notification obligation under Article 33 is triggered by a security incident that leads to actual or likely unauthorised access to personal data. If the penetration tester accesses real personal data during testing (which should be avoided), or if evidence suggests a vulnerability has already been exploited by a third party, the notification obligation may be triggered. Review critical and high findings with your Data Protection Officer and, if in doubt, seek legal advice from a UK GDPR specialist.

What qualifications should a web application penetration tester hold?

For UK businesses, the recognised qualification for web application penetration testing is the CREST Registered Web Application Tester (CRT), awarded by CREST after a rigorous technical examination. The CREST Certified Web Application Tester (CCT App) is the senior-level qualification. For government or public sector work, the NCSC CHECK scheme requires CHECK Team Leader or CHECK Team Member status. Ask any provider to confirm the qualifications of the individual testers assigned to your engagement before signing a contract.

Let us help

Need help applying this in your business?

Talk to our London-based team about how we can build the AI software, automation, or bespoke development tailored to your needs.

Deen Dayal Yadav, founder of Softomate Solutions

Deen Dayal Yadav

Online

Hi there ðŸ'‹

How can I help you?