Macksofy Technologies
Mumbai · Web App Pentest
CERT-In EmpanelledMumbai

Web Application Security in Mumbai · BFSI & Fintech

OWASP ASVS L3 manual AppSec for Mumbai BFSI net-banking, broker portals, payment gateways and SEBI MII platforms — RBI / SEBI / IRDAI overlay.

01
0+
Mumbai BFSI engagements
02
ASVS L0
Default methodology
03
Triple-regulator
RBI · SEBI · IRDAI
04
BKC walk-in
Same-day onsite
Web App Pentest in Mumbai

How a Macksofy web app pentest engagement runs in Mumbai.

Mumbai web-application-security is the deepest single-domain practice we run — the BFSI customer-facing web and API surface is where the largest book-of-record value moves through Indian banking. The scope is structurally different from a broader VAPT (which covers infrastructure, network, AD, mainframe and OT in addition to web) and different from a scenario-led pentest (which is graded against a single objective). A Mumbai AppSec engagement is the application-layer-and-below depth: authentication, session, authorisation, transaction-flow, integration, third-party-trust-chain and the regulator-clause closure. Macksofy delivers from BKC with senior consultants who have shipped enough RBI / SEBI / IRDAI inspections to know the difference between a finding the inspector will read and a finding the inspector will discard.

Methodology defaults to OWASP ASVS Level 3 plus OWASP API Security Top 10 (2023) plus the BFSI-specific abuse-case catalogue Macksofy has accumulated across 200+ Mumbai engagements. Burp Suite Pro, Caido and Nuclei run as supporting infrastructure. Every High and Critical finding is manually validated with a reproducible exploit (curl, Burp .req, Python harness or proxy script) attached to the report. The deliverable is a regulator-grade binder the bank's audit committee chair reads at the quarterly cyber review — not a Burp HTML export.

Net-banking and mobile-banking web-application security has its own playbook. The transaction-graph end-to-end: customer authentication, OTP / 2FA challenge, beneficiary-add flow, IMPS / NEFT / RTGS / UPI rails, reconciliation-to-book-of-record, dispute-flow and the fraud-stack integration. Abuse-case testing on velocity-control bypass, OTP reuse via SS7-style mobile-side weaknesses, beneficiary-add race conditions, reconciliation-drift exploitation, IMPS dispute-fraud paths and the UPI VPA-spoofing surface. Every finding maps to RBI Master Direction on IT Governance, Risk, Controls and Assurance Practices (November 2023) Annex-1 clauses and the RBI Cyber Security Framework CSITE Cell submission format.

Broker-terminal and AMC web-platform scope is the second Mumbai sub-segment. SEBI-regulated broker web platforms (Zerodha-style Kite, equivalent broker-terminals), AMC investor-portal apps and the broker-OMS-to-exchange gateway. Test surface includes broker-authorisation matrix exercise (sub-broker, dealer, RM, customer roles), algo-API rate-limit bypass, market-data tampering on Refinitiv / Bloomberg feed-handlers, order-management-to-NSE / BSE gateway authorisation, and the SEBI CSCRF Annexure-K AppSec evidence (CCI / CRMM scoring requires application-layer evidence the inspector reads).

Payment-gateway and aggregator web-platform scope is third. RBI PA-PG licensees in BKC and Lower Parel run merchant-portal apps, payout-and-settlement APIs, dispute-flow systems and reconciliation-layer apps. AppSec scope here closes RBI Payment Aggregator and Payment Gateway Master Direction clauses through the application-layer evidence — payment-flow abuse cases (token replay, refund-race, settlement-spoof, payout-amount tampering, merchant-side payment-intent manipulation), partner-merchant-onboarding-API hygiene, KYC-vendor-integration trust chain and the merchant-portal authorisation matrix.

Insurer web-platform scope adds IRDAI overlay. Life and general insurer customer-facing apps (policy issuance, claims-intake, renewal flows), Policy Administration System (PAS) web modules and partner-agent portals. Test surface includes claims-fraud paths (OVD-tamper, multi-policy-stitching, beneficiary-impersonation), KYC-impersonation via OVD upload portals and the PAS authorisation matrix tested role-by-role. Every finding maps to IRDAI Information and Cyber Security Guidelines (April 2023) clauses for the insurer's next IRDAI cyber-supervision review.

MII platform scope is the rarest and most consequential. SEBI Market Infrastructure Institutions (NSE, BSE, NSDL, CDSL) and the clearing-corporation web platforms face the highest evidence-quality bar in Indian financial-services AppSec. Macksofy's Mumbai bench has shipped AppSec into MII and MII-adjacent platforms — the methodology runs deeper, the report format follows SEBI's MII-specific guidelines, and the engagement letter includes a no-data-exfiltration acknowledgement plus an explicit market-disruption-prevention clause.

Procurement reality matters. Mumbai BFSI AppSec procurement closes through the CISO, the AppSec lead and (for the larger banks) the chief technology officer in a single weekly sync, plus a one-page engagement letter from the General Counsel covering production safe-harbour and regulator-submission attribution. Engagement letters typically include a Bombay High Court jurisdiction clause and explicit no-data-exfiltration acknowledgement. Reports are encrypted, double-key delivered (Macksofy senior + CISO) and the master is destroyed inside 30 days of closure unless the bank requests retention. Onsite cadence — BKC walk-in same day for kickoff and exit; Andheri MIDC, Powai, Goregaon SEEPZ, Thane and Navi Mumbai reachable inside four hours. Engagement length is typically 4-6 weeks per AppSec scope, scaled by application count.

Engagement workflow

Five phases. Mumbai timeline.

Every Macksofy web app pentest engagement in Mumbai runs through the same phased protocol — adapted to Mumbai-specific procurement, regulator and delivery realities.

01
Phase 01
Scope & Regulator Crosswalk
  • Joint kickoff with CISO, AppSec lead and CTO; regulator profile confirmed (RBI / SEBI / IRDAI / MII)
  • Application inventory with money-movement-graph and authorisation-matrix mapping
  • Engagement letter — Bombay High Court jurisdiction, no-data-exfiltration acknowledgement, production safe-harbour
  • OWASP ASVS L3 + API Top 10 + BFSI abuse-case catalogue selected per application profile
02
Phase 02
Recon & Surface Map
  • Authenticated and unauthenticated surface mapping with Burp Pro, Caido and Nuclei against staging and controlled prod
  • Authorisation-matrix discovery role-by-role (customer, sub-broker, dealer, RM, agent, vendor)
  • Third-party integration inventory (KYC vendor, account aggregator, credit bureau, exchange gateway)
  • Mobile-app reversing on the latest Play Store and App Store builds (Frida, MobSF, Objection)
03
Phase 03
Manual Exploitation
  • Transaction-graph abuse — velocity bypass, OTP reuse, beneficiary race, reconciliation drift
  • Broker-terminal authorisation-matrix exercise role-by-role with algo-API rate-limit bypass
  • Payment-flow abuse — token replay, refund-race, settlement-spoof, payout-amount tampering
  • Insurer claims-fraud paths — OVD-tamper, multi-policy-stitching, beneficiary-impersonation
04
Phase 04
Regulator-Format Reporting
  • Executive summary in RBI MD-ITGRC + SEBI CSCRF + IRDAI 2023 language, clause-mapped
  • CVSS v3.1 plus Macksofy business-impact scoring calibrated to transaction value-at-risk
  • SEBI CSCRF Annexure-K AppSec evidence for broker / AMC / MII scopes
  • Reproducible exploit code (curl / Burp .req / Python) per High and Critical
05
Phase 05
Re-test & Closure
  • 60-day re-test window covering every Critical and High at no extra cost
  • Encrypted double-key board-pack delivery to CISO + audit-committee chair
  • CERT-In empanelled closure letter and SAR / inspection-defence support
  • Risk register update synced to the bank's GRC tool
Industries served

Which Mumbai verticals we deliver Web App Pentest for.

Private bank web platforms

BKC / Lower Parel / Andheri net-banking and mobile-banking apps — transaction-graph and authorisation-matrix testing.

Stock brokers & AMCs

BKC broker-terminal and AMC investor-portal apps — CSCRF Annexure-K AppSec evidence with algo-API rate-limit testing.

SEBI MII platforms

Market Infrastructure Institution web platforms — MII-specific submission-format reporting with market-disruption-prevention clauses.

Payment aggregators

BKC / Lower Parel PA-PG licensees — merchant-portal and payment-flow abuse testing with RBI PA-PG closure.

Life & general insurers

Worli / Andheri insurer customer apps and PAS web modules — IRDAI 2023 cyber guidelines clause closure.

NBFCs & lending fintech

Lower Parel NBFC apps — RBI Scale-Based Regulation and Digital Lending Guidelines AppSec evidence.

What ships

The Mumbai deliverable pack.

Every Mumbai web app pentest engagement closes with the pack below — regulator-ready evidence, technical detail and board-readable summaries.

  • OWASP ASVS L3 AppSec report with reproducible exploit code per High and Critical
  • RBI MD-ITGRC + SEBI CSCRF + IRDAI 2023 clause crosswalk per finding
  • BFSI abuse-case evidence pack (transaction-graph, broker-terminal, payment-flow, claims-fraud paths)
  • SEBI CSCRF Annexure-K AppSec evidence for broker / AMC / MII scopes
  • Authorisation-matrix evidence per role exercised (customer / sub-broker / dealer / RM / agent)
  • Reproducible exploit code (curl / Burp .req / Python) per High and Critical
  • Encrypted double-key delivery to CISO + audit-committee chair only
  • Free re-test of every Critical and High inside a 60-day window
Recent Mumbai engagement

A Mumbai web app pentest case study.

Mumbai-headquartered Tier-1 Private Bank (BKC corporate tower) — net-banking + mobile-banking + UPI app scope
Scope

OWASP ASVS L3 AppSec across 28 customer-facing endpoints — net-banking, mobile-banking, UPI app, beneficiary-add flow, IMPS / NEFT / RTGS rails, customer dispute-flow and fraud-stack integration; 5-week engagement with two BKC onsite legs

Outcome

Three velocity-control bypass paths on the IMPS rail closed pre-disclosure; one reconciliation-drift path that allowed beneficiary-add-without-debit closed; one UPI VPA-spoofing path via mobile-side weakness closed; SEBI CSCRF Annexure-K AppSec evidence accepted on first read; 11 Critical and 18 High findings closed inside 38 days; encrypted board-pack delivered to CISO and audit-committee chair on schedule.

What clients say · Trusted India + UAE

Rated 4.9 ★ from 612 client reviews.

CERT-In Empanelled
Govt of India · MeitY
EC-Council ATC
Authorized Training
ISO 27001 Certified
Info Security Mgmt
We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.
AK
Aisha Khan
Information Security Manager · Listed Fintech · BKC, Mumbai
The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.
IK
Inspector K. Joshi
Cyber Cell · Maharashtra Police · Mumbai
Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.
VI
Vivek Iyer
DevSecOps Lead · Healthcare SaaS · Hyderabad
FAQ

Questions Mumbai buyers ask before signing.

AppSec is application-layer-and-below depth — authentication, session, authorisation, transaction-flow, integration, third-party-trust-chain and the regulator-clause closure on the web / API surface. VAPT is broader — infrastructure, network, AD, mainframe and OT in addition to web. Most Mumbai BFSI clients run both annually — AppSec for the customer-facing app surface, VAPT for the regulator-required infrastructure scope.
More services in Mumbai

Other Macksofy engagements in Mumbai.

Web App Pentest in other cities

Same engagement, other Macksofy metros.

Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.