This test is based on the list of web application threats compiled by OWASP (The Open Web Application Security Project). A wide variety of procedures and best practices for the testing and secure development of apps are used for the actual verification.
In addition, new types of threats are always taken into account and individual wishes are always welcome.
In order to make the penetration test as efficient as possible, all basic conditions of the security check are defined and contractually agreed upon in a previous customer discussion. A contact person should be available by telephone during the examination.