You will get a Penetration testing for your Web application
Younes B.
Rising Talent
You will get a Penetration testing for your Web application
Younes B.
Rising Talent
Project details
In this Project, I offer a detailed test of your website to find any security issues. The test is customized to fit the technology and business logic used on your website. I will look for the most important security risks that could affect your website, based on the Open Web Application Security Project's guidelines. Your website will be tested specifically for these risks:
Broken access control ( Authorizations, Authentication, Session...)
Injection Bugs ( SQL injection,XSS,XXE,OS Commands...)
File upload vulnerability
Sensitive data exposure ( IDOR, BOLA, logs & backup files...)
SSL & Header Misconfiguration
APIs & GraphQL Endpoints Security
Components with known vulnerabilities
You Will Get a Detailed Report:
Summary
Technical Explanation + Proof of concepts
Mitigation & fix recommendations
Broken access control ( Authorizations, Authentication, Session...)
Injection Bugs ( SQL injection,XSS,XXE,OS Commands...)
File upload vulnerability
Sensitive data exposure ( IDOR, BOLA, logs & backup files...)
SSL & Header Misconfiguration
APIs & GraphQL Endpoints Security
Components with known vulnerabilities
You Will Get a Detailed Report:
Summary
Technical Explanation + Proof of concepts
Mitigation & fix recommendations
Cybersecurity Assessment Type
Bug BountyCybersecurity Expertise
AuditTechnology Type
Firewall, Operating System, Web Application$70
- Delivery Time 4 days
- Application Audit
- Cost Estimation
Frequently asked questions
About Younes
Experienced Bug Bounty Hunter | Expert Penetration Tester | Master of
Casablanca, Morocco - 4:03 pm local time
1) Injection Flaws
2) Broken Authentication and Session Management
3) Cross-Site Scripting (XSS)
4) Broken Access Control
5) Security Misconfigurations
6) Insecure Cryptographic Storage
7) Insufficiently Protected APIs
8) Insufficient Logging and Monitoring
9) Insecure Communication
10) Software and Hardware Vulnerabilities
Leveraging my expertise in these areas, I have successfully identified and reported numerous security issues, earning recognition in various organizations' Halls of Fame. My technical skills and insights have significantly contributed to enhancing security postures through vulnerability disclosure programs.
In addition to my penetration testing skills, I have solid backend development expertise. I am proficient in Node.js, Express.js, MongoDB (Mongoose), Firebase, and SQL databases. My development experience enables me to understand application architectures deeply, aiding in more effective vulnerability discovery and remediation.
With a keen eye for detail and innovative thinking, I am committed to delivering high-quality results promptly and efficiently. If you need a bug bounty hunter with a proven track record of success, please contact me to discuss your project further
Steps for completing your project
After purchasing the project, send requirements so Younes can start the project.
Delivery time starts when Younes receives requirements from you.
Younes works on your project following the steps below.
Revisions may occur after the delivery date.
Contact Me to negotiate about the Deadlines