Skip to main content

White Papers & Research

Free methodology papers from the Lorikeet Security research team. Download and use them in procurement, vendor assessments, or just to understand how we work.

12 Papers Available No Email Required April 2026
Web Application

Web Penetration Testing Methodology

Our comprehensive web application security testing approach — covering the full lifecycle from recon to reporting. Aligned with OWASP, ASVS, and PTES.

  • OWASP Top 10 & Testing Guide v4.2
  • ASVS Level 2 & 3 coverage
  • Authentication, injection, IDOR, SSRF
  • REST API & GraphQL testing
  • Business logic & access control
New
AI & LLM Security

AI & LLM Penetration Testing Methodology

Emerging methodology for testing AI-powered applications — covering prompt injection, jailbreaking, model inversion, RAG poisoning, and agentic system abuse. Aligned with OWASP LLM Top 10.

  • OWASP LLM Top 10
  • Prompt injection & jailbreaking
  • RAG & knowledge base poisoning
  • Agentic & tool-use abuse
  • Model supply chain & data privacy
ATM & Embedded

ATM & Kiosk Penetration Testing Methodology

Physical and logical security assessment methodology for ATM networks, cash kiosks, and embedded payment systems. Covers XFS protocol, jackpotting resistance, and network isolation.

  • XFS / CEN protocol analysis
  • Physical tamper & anti-skimming
  • Network isolation & segmentation
  • Jackpotting resistance testing
  • OS hardening & patch assessment
New
Compliance

What is PCI DSS? A Complete Guide

Understand the Payment Card Industry Data Security Standard: its history, twelve core requirements, merchant tiers, and the changes introduced in v4.0.

  • PCI DSS v4.0 requirements breakdown
  • Merchant tiers & validation levels
  • SAQ types & assessment scope
  • Competitive advantages of compliance
New
Compliance

What is ISO? A Complete Guide

Understand ISO/IEC 27001:2022, the key security certifications for technology organizations, the certification journey, and how ISO compliance can be a strategic differentiator.

  • ISO/IEC 27001:2022 overview
  • Annex A controls breakdown
  • Certification journey & timeline
  • ISO as a strategic differentiator
New
Compliance

What is SOC 2? A Complete Guide

Understand SOC 2: its origin, the five Trust Service Criteria, Type I vs. Type II distinctions, how to prepare for an audit, and why it's a de facto requirement for SaaS companies.

  • Five Trust Service Criteria explained
  • Type I vs. Type II distinctions
  • Audit preparation roadmap
  • SaaS & enterprise buyer requirements
New
Penetration Testing

Demystifying SMB Penetration Testing

A practical guide for small and medium-sized businesses: what penetration testing is, why SMBs need it, how to scope the right engagement, and how to choose a provider.

  • SMB-specific threat landscape
  • Testing types & scoping guidance
  • Reading & acting on deliverables
  • Choosing the right provider
New
Penetration Testing

Penetration Testing vs Vulnerability Scanning

Understand the difference between penetration testing and vulnerability scanning: how they work, what they find, when to use each, and how to build a program that leverages both.

  • Side-by-side comparison
  • When to use each approach
  • False positive rates & validation
  • Building a combined program
New
Penetration Testing

Top Compliance & Penetration Testing Findings

The most common vulnerabilities identified across web application, network, and compliance assessments — with concrete remediation steps to address each category.

  • Auth & access control findings
  • Network security findings
  • Remediation steps per category
  • Risk prioritization guidance
New
Security Program

From Compliance to Competitive Edge

How proactive penetration testing moves beyond checkbox compliance to drive sales acceleration, customer trust, cyber insurance positioning, and operational resilience.

  • Compliance baseline across frameworks
  • Sales acceleration & deal closing
  • Cyber insurance positioning
  • Operational resilience benefits
New
Security Program

Common Security Fixes

A remediation handbook for development and security teams — implementation-ready fixes for the most frequently identified vulnerabilities across web apps, APIs, and infrastructure.

  • Critical & high severity fixes
  • SQL injection, SSRF, IDOR remediation
  • Network & TLS hardening
  • OWASP & NIST aligned guidance
New
Security Program

Building a Security Program from Scratch

A practical roadmap for startups and growing organizations — covering governance, access control, vulnerability management, incident response, and the path to SOC 2 and ISO 27001.

  • Phased implementation roadmap
  • Governance & policy foundations
  • Vulnerability management setup
  • Path to SOC 2 & ISO 27001

Want a Custom Methodology?

We tailor our testing approach to your stack, compliance requirements, and risk tolerance. Get in touch to discuss your engagement.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!