Web Application Penetration Testing: What to Expect, How to Prepare, and What the Report Means | Lorikeet Security Skip to main content
Back to Blog

Web Application Penetration Testing: What to Expect, How to Prepare, and What the Report Means

Lorikeet Security Team March 8, 2026 11 min read

What a Web Application Pentest Actually Is (and Is Not)

A web application penetration test is a structured, manual security assessment where skilled testers attempt to identify and exploit vulnerabilities in your web application the same way a real attacker would. It is not a vulnerability scan. It is not a code review. And it is not a checkbox exercise -- though it satisfies many compliance checkboxes in the process.

The distinction matters because many organizations order their first pentest expecting a simple scan report with red, yellow, and green indicators. What they receive instead is a detailed document describing how a tester bypassed their authentication, accessed another user's data, escalated privileges to an admin account, and exfiltrated sensitive records. That level of depth is exactly the point -- and exactly what vulnerability scanners cannot provide.

If you are preparing for your first web application penetration test, or if previous tests left you uncertain about what you received and whether it was thorough, this guide walks through the entire lifecycle from initial scoping through remediation verification.

Key distinction: A vulnerability scan checks your application against a database of known issues. A penetration test uses a human who thinks creatively, chains findings together, and tests business logic flaws that no automated tool can detect. The two are complementary, not interchangeable.


Phase 1: Scoping and Pre-Engagement

The quality of a penetration test is largely determined before testing begins. Scoping defines what gets tested, how it gets tested, and what the boundaries are. Poor scoping leads to either an incomplete test that misses critical functionality or a bloated engagement that wastes budget on low-value targets.

Defining the Target Scope

Your penetration testing firm will ask you to define the scope, which includes:

Rules of Engagement

The Rules of Engagement (ROE) document establishes the legal and operational boundaries of the test. A professional firm will provide this document for your review and signature before any testing begins. It typically covers:

Gray Box vs Black Box vs White Box

Most web application pentests use a gray box approach, where testers have authenticated access and basic documentation but not source code access. This simulates the most realistic attack scenario -- an attacker who has obtained valid credentials through phishing, credential stuffing, or purchasing them on the dark web.

Black box testing (no credentials, no documentation) is less efficient because testers spend significant time discovering functionality that you could simply tell them about. White box testing (full source code access) provides the deepest coverage but costs more and takes longer. For most organizations, gray box delivers the best balance of depth and efficiency. For a comparison with source code review, see our code review vs pentest guide.

Preparation tip: Create dedicated test accounts for each user role in your application before testing begins. Do not share production credentials with testers. Provide accounts with realistic data access so testers can evaluate horizontal and vertical authorization controls accurately.


Phase 2: Reconnaissance and Discovery

Once testing begins, the first phase is reconnaissance -- understanding the application's technology stack, architecture, and attack surface before attempting any exploitation.

What Testers Look For During Recon

This phase typically takes 15 to 20 percent of the total testing time. Thorough reconnaissance directly improves the quality of findings in later phases -- testers who understand your application's architecture find vulnerabilities that surface-level testing misses.


Phase 3: Testing and Exploitation

This is the core of the engagement where testers systematically probe your application for vulnerabilities. Professional pentest firms follow established methodologies to ensure comprehensive coverage. For an overview of the most common issues found, see our OWASP Top 10 in real-world assessments guide.

OWASP Testing Methodology

The OWASP Web Security Testing Guide (WSTG) is the industry standard methodology for web application penetration testing. It organizes testing into categories that map to common vulnerability classes:

OWASP Category What Is Tested Common Findings
Authentication Login, password reset, session management, MFA Weak password policies, session fixation, bypass techniques
Authorization Access controls, IDOR, privilege escalation Horizontal privilege escalation, missing function-level access checks
Input Validation XSS, SQL injection, command injection, SSRF Reflected/stored XSS, SSRF, template injection
Business Logic Workflow bypasses, race conditions, pricing manipulation Coupon stacking, quantity manipulation, state machine bypasses
Cryptography TLS configuration, data encryption, token generation Weak algorithms, predictable tokens, insecure key storage
Error Handling Error messages, stack traces, debug information Verbose errors exposing internal paths, database schemas, API keys

What Testers Spend the Most Time On

In our experience running hundreds of web application assessments, the areas that yield the highest-impact findings are:


How to Prepare Your Team and Environment

The better prepared you are, the more value you extract from the engagement. Here is a preparation checklist we share with every client before testing begins. For a broader look at the full engagement process, see our guide on what happens during a pentest.


Understanding Your Pentest Report

The deliverable from a web application penetration test is a detailed report. Understanding its structure and how to act on it is as important as the test itself. For a deep dive on this topic, see our guide on how to read a pentest report.

Report Structure

A professional pentest report contains several distinct sections, each serving a different audience:

Severity Ratings: What They Mean

Severity CVSS Range What It Means Expected Response
Critical 9.0 - 10.0 Direct path to data breach or full system compromise with minimal attacker effort Fix immediately, consider incident response
High 7.0 - 8.9 Significant data exposure or privilege escalation requiring some attacker skill Fix within 1-2 weeks
Medium 4.0 - 6.9 Limited data exposure, requires chaining with other vulnerabilities Fix within 30-60 days
Low 0.1 - 3.9 Information disclosure, minor configuration issues Fix during normal development cycles
Informational 0.0 Best practice recommendations, defense-in-depth suggestions Consider during architecture reviews

Common Findings We See in Web Application Pentests

After conducting hundreds of web application penetration tests across SaaS platforms, e-commerce sites, fintech applications, and healthcare portals, these are the findings we report most frequently:

A note on "clean" reports: No pentest report should come back completely clean. If a report finds zero issues, that is a signal to question the thoroughness of the test, not to celebrate. Every application has areas for improvement. A good pentest firm will include informational findings and hardening recommendations even if no exploitable vulnerabilities exist.


Phase 4: Remediation and Verification

Findings without remediation are just expensive documentation. The value of a penetration test is realized when vulnerabilities are fixed and verified. For guidance on communicating findings to leadership, see our guide on explaining pentest results to executives.

Building Your Remediation Plan

Common Retest Pitfalls

Approximately 20 to 30 percent of findings we retest are only partially remediated. The most common reason is that the fix addressed the specific test case from the report but did not address the underlying vulnerability pattern. Authorization bypasses, in particular, tend to reappear in different parts of the application if the fix is applied per-endpoint rather than at the framework level.

Integrating Pentesting Into Your Development Lifecycle

The organizations that get the most value from penetration testing treat it as a continuous feedback loop, not an annual event. Here is how mature organizations integrate pentest findings into their development process:


Choosing the Right Pentest Firm

Not all penetration testing firms deliver the same quality. The difference between a thorough assessment and a glorified vulnerability scan comes down to the testers' skill, methodology, and communication. For pricing transparency, see our pentest pricing guide, and for guidance on timing, see when to hire a pentest firm.

Key evaluation criteria:

What AI-Generated Code Means for Your Pentest

If your development team uses AI coding assistants like GitHub Copilot, Cursor, or similar tools, your penetration test results may look different than you expect. AI-generated code introduces specific vulnerability patterns that experienced testers now look for: inconsistent input validation, over-permissive CORS configurations, authentication logic that works for the happy path but fails on edge cases, and hardcoded credentials in code that was supposed to be a placeholder.

This does not mean AI-assisted development is inherently insecure. It means that the security review process needs to account for the patterns that AI code generation tends to produce. A thorough web application pentest will catch these issues regardless of whether a human or an AI wrote the code.

Ready to Test Your Web Application's Security?

Lorikeet Security's Offensive Security Bundle ($37,500/yr) includes web application penetration testing, red teaming, and social engineering assessments. Our testers follow OWASP methodology and deliver reports with actionable remediation guidance.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!