Vulnerability Testing Methodologies
See how APVISO agents discover, validate, report, and help remediate common web application and API vulnerability classes.
SQL Injection Testing Methodology
How APVISO tests web applications and APIs for SQL injection, blind SQLi, and database-backed attack paths.
SSRF Testing Methodology
How APVISO tests URL-handling features, webhooks, importers, and cloud-native applications for SSRF risk.
IDOR Testing Methodology
How APVISO tests object-level authorization and cross-tenant data exposure in web apps and APIs.
XSS Testing Methodology
How APVISO tests reflected, stored, and DOM-based XSS with context-aware payloads and safe evidence.
Broken Access Control Testing Methodology
How APVISO tests user, role, tenant, and function-level authorization boundaries across web apps and APIs.
Authentication Bypass Testing Methodology
How APVISO tests login, reset, session, MFA, magic-link, and token flows for authentication bypass risk.
Business Logic Flaw Testing Methodology
How APVISO tests application workflows for abuse cases that scanners often miss, including payments, quotas, approvals, and state transitions.
API Authorization Testing Methodology
How APVISO tests REST, GraphQL, and internal APIs for missing authorization, scope confusion, and cross-tenant access.