You will get a professional penetration testing with a detailed report

Monoroanjan S.
Monoroanjan S.

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Monoroanjan, priced and ready to go.

You will get a professional penetration testing with a detailed report

Monoroanjan S.
Monoroanjan S.

Select service tier

Basic penetration test

I will do a basic penetration test And give you a basic Penetration test report

  • Delivery Time 3 days
    • Small Company Size

3 days delivery — Oct 10, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Monoroanjan gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Monoroanjan, priced and ready to go.

Project details

If are you looking for a professional who can do a Penetration Test on your website and check the Vulnerability Analysis and recommend you the best way to avoid getting hacked, then you have come to the right place.

With this service, you get an in-depth penetration test report of your website. I will attempt to hack your system using the same technologies that hackers used. The test is customized toward the underlying technology as well as its internal business logic. I will check for the most critical web application security risks according to the Open Web Application Security Project. Specifically, your application will be tested against (among others):
File Upload Vulnerabilities.
Access Control (authentication, authorization, session management).
Sensitive data exposure (username and backup file exposure, IDOR, etc.).
Injection flaws (XSS, CRLF, SQL, OS command, expression language, LDAP, XPath, etc.).
Server-side security.
API endpoint security.
SSL Configuration

You will receive a detailed report of the penetration test, including:
Proof of concept
Technical details of the vulnerabilities
Consultation
I look forward to meeting with you. Thanks.
Cybersecurity Expertise
Data Protection, Audit, Risk Assessment
Technology Type
Computer Network, Data Center, Operating System, Web Application, Email System, Mobile Device
Cybersecurity Regulation
CMMC, ISO, HITECH, NIST Cybersecurity Framework, SOC 2
What's included
Service Tiers Starter
$100
Standard
$250
Advanced
$500
Delivery Time 3 days 5 days 6 days
Small Company Size
-
-
Medium Company Size
-
-
Large Company Size
-
-
Optional add-ons You can add these on the next page.
Fast Delivery
+$30 - $50

Frequently asked questions

Monoroanjan S.

About Monoroanjan

Monoroanjan S.
Penetration Tester | Cyber Security Expert | Ethical Hacker
Dinajpur, Bangladesh - 3:37 am local time
As a Cybersecurity Enthusiast and Ethical Hacker, I possess extensive experience in ensuring the security of web and mobile applications, API security, and conducting Vulnerability Assessment & Penetration Testing. My expertise includes working with a wide range of tools, including Burp Suite, Acunetix, Nessus, IBM AppScan, Nmap, Pentest tools, Kali Linux, and several other GitHub open-source tools like Amass,Nuclei, and Aquatone to detect vulnerabilities. My frequent findings include account takeover, injections, privilege escalation, LFI, XSS, and OWASP Top 10.

In addition to providing Server Hardening and Malware removal services for websites, I also specialize in Firewall configuration and hardening, along with all services of Digital Ocean.

As an expert, I provide the following services:
Application Penetration Testing with remediation recommendations
Complete security assessment of applications with remediation recommendations
Cloud (AWS) infrastructure vulnerability assessment, security & penetration testing with remediation recommendations
Reconnaissance - Open Source Intelligence (OSINT) using tools such as Metasploit, Spiderfoot, Buscador, Maltego, Recon-ng, Shodan, the harvester etc.
Static and Dynamic code analysis (SAST & DAST) with remediation recommendations
API Security
Firewall audit and configuration
Security and penetration testing trainer
Malware, Phishing, Breach, data leakage detection
Android and iOS application vulnerability detection and security testing
I have successfully secured so many companies, and my expertise is trusted in the industry for ensuring robust cybersecurity practices.

Steps for completing your project

After purchasing the project, send requirements so Monoroanjan can start the project.

Delivery time starts when Monoroanjan receives requirements from you.

Monoroanjan works on your project following the steps below.

Revisions may occur after the delivery date.

Monoroanjan works on your project following the steps below.

1. Information Gathering 2. Reconnaissance 3. Discovery and Scanning 4. Vulnerability Assessment 5. Exploitation 6. Report writing

Review the work, release payment, and leave feedback to Monoroanjan.