You will get a Penetration testing for your Web application

Younes B.
Younes B.
Rising Talent

Let a pro handle the details

Buy Assessments & Penetration Testing services from Younes, priced and ready to go.

You will get a Penetration testing for your Web application

Younes B.
Younes B.
Rising Talent

Let a pro handle the details

Buy Assessments & Penetration Testing services from Younes, priced and ready to go.

Project details

In this Project, I offer a detailed test of your website to find any security issues. The test is customized to fit the technology and business logic used on your website. I will look for the most important security risks that could affect your website, based on the Open Web Application Security Project's guidelines. Your website will be tested specifically for these risks:

Broken access control ( Authorizations, Authentication, Session...)
Injection Bugs ( SQL injection,XSS,XXE,OS Commands...)
File upload vulnerability
Sensitive data exposure ( IDOR, BOLA, logs & backup files...)
SSL & Header Misconfiguration
APIs & GraphQL Endpoints Security
Components with known vulnerabilities


You Will Get a Detailed Report:

Summary
Technical Explanation + Proof of concepts
Mitigation & fix recommendations
Cybersecurity Assessment Type
Bug Bounty
Cybersecurity Expertise
Audit
Technology Type
Firewall, Operating System, Web Application
What's included $70 These options are included with the project scope.
$70
  • Delivery Time 4 days
    • Application Audit
    • Cost Estimation

Frequently asked questions

Younes B.

About Younes

Younes B.
Experienced Bug Bounty Hunter | Expert Penetration Tester | Master of
Casablanca, Morocco - 4:03 pm local time
My name is Younes Bousfiha, and I am a skilled and experienced bug bounty hunter dedicated to uncovering security vulnerabilities. I have a comprehensive understanding of the OWASP Top 10 risks, including:

1) Injection Flaws
2) Broken Authentication and Session Management
3) Cross-Site Scripting (XSS)
4) Broken Access Control
5) Security Misconfigurations
6) Insecure Cryptographic Storage
7) Insufficiently Protected APIs
8) Insufficient Logging and Monitoring
9) Insecure Communication
10) Software and Hardware Vulnerabilities
Leveraging my expertise in these areas, I have successfully identified and reported numerous security issues, earning recognition in various organizations' Halls of Fame. My technical skills and insights have significantly contributed to enhancing security postures through vulnerability disclosure programs.

In addition to my penetration testing skills, I have solid backend development expertise. I am proficient in Node.js, Express.js, MongoDB (Mongoose), Firebase, and SQL databases. My development experience enables me to understand application architectures deeply, aiding in more effective vulnerability discovery and remediation.

With a keen eye for detail and innovative thinking, I am committed to delivering high-quality results promptly and efficiently. If you need a bug bounty hunter with a proven track record of success, please contact me to discuss your project further

Steps for completing your project

After purchasing the project, send requirements so Younes can start the project.

Delivery time starts when Younes receives requirements from you.

Younes works on your project following the steps below.

Revisions may occur after the delivery date.

Contact Me to negotiate about the Deadlines

Review the work, release payment, and leave feedback to Younes.