API Testing

API testing can be an unnerving task if you aren’t quite sure where to start.

We have the resources you need to understand how to test your APIs and actually test them.
Really.
Identifying Vulnerabilities for
Customized Recommendations
Improper Authorization
Input Validation
Message Integrity
Weak Authentication
Output Encoding
HTTP Return Code
Broken Authentication
Cryptography
Data Encryption
Looking for a First-Class
Cybersecurity Expert?
Understand the risk posed to you, and your customers, by the vulnerabilities present in the API/message layer and web UI level of your applications.

API Security

Identify API Vulnerabilities and Exposures

When it comes to API security testing, there are a number of things to consider.

So here at MainNerve, we perform API security testing by analyzing both request and response. This is done in order to discover and fix security vulnerabilities earlier in the software development cycle.

Whether you’re using REST, SOAP, or a mix of both, we’ve got your APIs covered.

Further, a detailed analysis of JSON and XML are performed as part of our API security testing process.

A Hybrid Approach

All of our API Penetration Tests go beyond national standards – such as OWASP – and your test will come with a detailed final report.

Your detailed final report will include an executive summary, a listing of findings, risk ratings and remediation recommendations.  A letter of accreditation can be provided upon your request.

Throughout the API penetration testing process, automated, as well as comprehensive manual testing, will be used to identify existing vulnerabilities at the API/message layer of  your applications.

Systematic Protection
Our Process

Here at MainNerve, our API security testing process involves a comprehensive, risk-based approach to manually identify critical API vulnerabilities.

Throughout the API security process, a number of professional tools will be utilized to perform an in-depth test. These tools may include: BurpSuite, RestClient, SOAPUIPro, and more.

Following the conclusion of the API penetration test, MainNerve will provide a comprehensive final report that details all findings associated with the test.

The first phase of the API penetration test is critical to the success of the test. It is very important that the team understands all of the features and functions of the application. The team does this by browsing through the application, going through the user manuals or, if required, a walkthrough of the application along with the application owner or developers. We work with you to ensure we are fully aware of its aims, functions, etc.

The threat profile comprises a list of potential threats against the application that we have identified. The threat profile is the starting point for all subsequent tests.  We map each threat in the threat profile to specific pages on your site. The test plan then identifies all the attacks we need to carry out on those pages to assess that specific threat.

Once the test plan and test cases are prepared and approved by a senior member of the team, the API penetration testing begins. This will comprise a combination of manual and automated checks that adhere to the test plan. During the course of testing the tester may identify additional tests or attacks to perform, in which case the test case will be updated and subsequent tests performed. The team takes up the threats one by one and starts performing the tests. If a test case is successful it is marked as unsafe in the test plan.

At MainNerve, we consider the final phase of the API penetration testing process, reporting, to be the most crucial and instrumental step. Once the team is through with the API testing, the reporting process begins. The detailed report delineates each vulnerability discovered as well as the method of discovery. Potential solutions to each finding are also included. The report is made available, securely, to the client after it has been reviewed internally.

Consider These
Value-Add Services
Social Engineering

Social engineering, in the context of information security, is commonly defined as the of persuasion and/or manipulation techniques in order to influence people into performing actions or divulging confidential information.

Ensure that your business is secure by testing and evaluating your employees against general phishing and “spear-phishing” attacks.

Web App Penetration Testing

Web application penetration testing is designed to assess and test the state of your web-facing applications, and provide actionable remediation recommendations for enhancing your security.

Ensure that your web applications are protected from malicious cyber threat actors. MainNerve web app pen tests are designed to review all types of web servers.

Compliance Solutions

MainNerve’s compliance solutions are designed to help fill one of the biggest challenges for businesses: staying in alignment with the exhaustive list of Governance, Risk Management, and Compliance (GRC) requirements.

From PCI DSS and HIPAA, to CJIS and FINRA, MainNerve can help your business navigate the GRC landscape with specialized penetration tests.

Customers & Partners that Trust MainNerve

What Our Clients Say

We value our professional relationship with MainNerve. Their employees are friendly and extremely responsive. They always take care of our clients as if they were their own, while maintaining the penetration and social engineering testing. We couldn’t ask for a better Cybersecurity partner. 

Don B.
MainNerve Partner & CEO of FrontierIT

In 12 years of tests, you are the first company that found anything higher than a low risk. Phone and cameras were never discovered in the test, let alone accessed. Great to always get a different perspective from a test. 

CIO
Investment Management Company

This is a very well written report! Very impressive!

Managing Partner
Data Warehouse Platform Company

The report looks great!

Network Administrator
Enterprise Administration Software Company

References available upon request.