You will get a professional Penetration Testing followed with a detailed report

You will get a professional Penetration Testing followed with a detailed report

Project details
You will get professional penetration testing with a detailed report. I will perform penetration testing using industry best practices based on PCI Approved Scanning Vendor (ASV) program guide and Open Web Application Security Project (OWASP) web application security, National Institute of Standards and Technology (NIST), and jurisdictional technical requirements.
Note: Automated scanners will only be used if the client wants.
Note: Automated scanners will only be used if the client wants.
Cybersecurity Assessment Type
Penetration TestingTechnology Type
Firewall, Operating System, Web ApplicationCybersecurity Regulation
ISO, NIST Cybersecurity Framework, PCI DSSWhat's included
Service Tiers |
Starter
$100
|
Standard
$300
|
Advanced
$600
|
---|---|---|---|
Delivery Time | 2 days | 3 days | 10 days |
Application Audit | - | - | - |
Project Plan | - | - | |
Cost Estimation |
1 review
(1)
(0)
(0)
(0)
(0)
This project doesn't have any reviews.
AZ
Amanda Z.
Oct 12, 2023
Looking for Pentester on API
Muhammad was quick, skilled and was extremely easy to communicate with. Would recommend him to anyone looking for a pentest!
About Muhammad
Penetration Tester | Ethical Hacker (OSCP Certified)
Karachi, Pakistan - 9:52 pm local time
🏆 Certified Ethical Hacker (CEHv11)
🏆 Certified Red Team Professional (CRTP)
🏆 eLearnSecurity Certified Professional Penetration Tester (eCPPT)
I am a dedicated Security Professional with over 4 years of experience delivering high-quality security services in information security.
My day to day work includes:
-- Vulnerability Assessments,
-- Web Application Penetration Testing
-- Network Penetration Testing
-- Mobile Applications Penetration Testing
-- Phishing Assessments
-- Red Teaming Engagement
-- WIFI Assessment
-- Social Engineering Campaign
-- Source Code Review
-- Cloud Security Review
-- Segmentation Testing
-- Configuration Reviews
In addition to my professional experience, I am an accomplished Bug Bounty Hunter with over 4 years of hands-on experience identifying vulnerabilities across various platforms. My ongoing pursuit of bugs ensures I stay updated on the latest threats and security trends, allowing me to implement effective network security measures, including firewalls and other protective technologies.
Let’s work together to bolster your security posture and protect your digital assets from evolving cyber threats. Contact me today to discuss how I can support your organization’s security needs!
Steps for completing your project
After purchasing the project, send requirements so Muhammad can start the project.
Delivery time starts when Muhammad receives requirements from you.
Muhammad works on your project following the steps below.
Revisions may occur after the delivery date.
Daily Updates
I will update you every morning for my findings.
Final/Draft Report
I will provide you the draft/final report on the last day of the project.