Skip to content
Services
Solutions
Industries
Partners
Insights
About
Get Started
Cybersecurity Services
Cybersecurity Services
vCISO / Fractional CISO
Offensive Security & Penetration Testing
Incident Response & Digital Forensics
Cybersecurity Awareness
CMMC Compliance
Managed IT Services
Help Desk & End User Support
NOC (Server/Network RMM)
MDR/XDR (AI-Assisted SOC)
Professional Services
Remote Deployment and Operations
Staff Augmentation
AI & Automation Consulting
Solutions
Infrastructure & Security
Cloud & Data Center
Data Protection & Backup/DR
Zero Trust Security
Remote Workforce & Endpoints
Virtual Desktops & Apps (VDI)
Unified Communications
Mobility Solutions
SaaS Protect Microsoft
SaaS Protect Google
Industries
Federal Government
State and Local Government
Healthcare
Education
Critical Infrastructure
All Industries
Partners
Microsoft
Hitachi
Nutanix
FileCloud
Google
Commvault
Dell EMC
Login VSI
Omnissa
HPE
TURBO.NET
Red Hat
All Partners
Microsoft
Google
Omnissa
Hitachi
Commvault
HPE
Nutanix
Dell EMC
TURBO.NET
FileCloud
Login VSI
Red Hat
All Partners
Insights
Blog
Z7 Cyber Intelligence
Case Studies
Capability Statement
About
Why Z7 Solutions
Contract Vehicles
Careers
Contact Us
Home
Mobile App Pen-Test
Mobile App Pen-Test
Company Name
Company Website
Name
Email Address
Mobile Application name
Mobile operating system (Android, iOS)
Does the application have SSL pinning implemented?
If the application has SSL pinning implemented, is there a possibility to remove it?
Which penetration testing method would you like to be performed
White Box
Black Box
Grey Box
(Black Box, White Box or Grey Box)
Has there already been done any type of security check of the web application
(penetration testing, vulnerability assessment, security code review)
What is the purpose of the mobile application, who is it intended for, and who uses it?
Does the application have a test environment or is pen-testing to be done on production?
Has the mobile application already been data pre-filled or is it empty (data must be entered manually)?
Has the development of the web application been completed or is it in the development process?
What technology is used (programming language, framework, database)?
Authentication method, how does the user log into the application?
Does the server have any type of protection such as WAF (Web Application Firewall)? Is there a possibility to add our IP addresses to the whitelist?
(Username and password, MFA, certificates, tokens)
Do you have an application manual, architecture diagram, or API documentation? Can you provide it to us?
How many roles does the application have, and do all roles need to be tested? If possible, provide us with a brief description of them.
Other
Submit Form