You will get a professional penetration testing with a detailed report
Monoroanjan S.
You will get a professional penetration testing with a detailed report
Monoroanjan S.
Basic penetration test
I will do a basic penetration test And give you a basic Penetration test report
- Delivery Time 3 days
- Small Company Size
3 days
delivery —
Oct 10, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Monoroanjan gets paid once you are satisfied with the work.
Project details
If are you looking for a professional who can do a Penetration Test on your website and check the Vulnerability Analysis and recommend you the best way to avoid getting hacked, then you have come to the right place.
With this service, you get an in-depth penetration test report of your website. I will attempt to hack your system using the same technologies that hackers used. The test is customized toward the underlying technology as well as its internal business logic. I will check for the most critical web application security risks according to the Open Web Application Security Project. Specifically, your application will be tested against (among others):
File Upload Vulnerabilities.
Access Control (authentication, authorization, session management).
Sensitive data exposure (username and backup file exposure, IDOR, etc.).
Injection flaws (XSS, CRLF, SQL, OS command, expression language, LDAP, XPath, etc.).
Server-side security.
API endpoint security.
SSL Configuration
You will receive a detailed report of the penetration test, including:
Proof of concept
Technical details of the vulnerabilities
Consultation
I look forward to meeting with you. Thanks.
With this service, you get an in-depth penetration test report of your website. I will attempt to hack your system using the same technologies that hackers used. The test is customized toward the underlying technology as well as its internal business logic. I will check for the most critical web application security risks according to the Open Web Application Security Project. Specifically, your application will be tested against (among others):
File Upload Vulnerabilities.
Access Control (authentication, authorization, session management).
Sensitive data exposure (username and backup file exposure, IDOR, etc.).
Injection flaws (XSS, CRLF, SQL, OS command, expression language, LDAP, XPath, etc.).
Server-side security.
API endpoint security.
SSL Configuration
You will receive a detailed report of the penetration test, including:
Proof of concept
Technical details of the vulnerabilities
Consultation
I look forward to meeting with you. Thanks.
Cybersecurity Expertise
Data Protection, Audit, Risk AssessmentTechnology Type
Computer Network, Data Center, Operating System, Web Application, Email System, Mobile DeviceCybersecurity Regulation
CMMC, ISO, HITECH, NIST Cybersecurity Framework, SOC 2What's included
Service Tiers |
Starter
$100
|
Standard
$250
|
Advanced
$500
|
---|---|---|---|
Delivery Time | 3 days | 5 days | 6 days |
Small Company Size | - | - | |
Medium Company Size | - | - | |
Large Company Size | - | - |
Optional add-ons
You can add these on the next page.
Fast Delivery
+$30 - $50Frequently asked questions
About Monoroanjan
Penetration Tester | Cyber Security Expert | Ethical Hacker
Dinajpur, Bangladesh - 3:37 am local time
In addition to providing Server Hardening and Malware removal services for websites, I also specialize in Firewall configuration and hardening, along with all services of Digital Ocean.
As an expert, I provide the following services:
Application Penetration Testing with remediation recommendations
Complete security assessment of applications with remediation recommendations
Cloud (AWS) infrastructure vulnerability assessment, security & penetration testing with remediation recommendations
Reconnaissance - Open Source Intelligence (OSINT) using tools such as Metasploit, Spiderfoot, Buscador, Maltego, Recon-ng, Shodan, the harvester etc.
Static and Dynamic code analysis (SAST & DAST) with remediation recommendations
API Security
Firewall audit and configuration
Security and penetration testing trainer
Malware, Phishing, Breach, data leakage detection
Android and iOS application vulnerability detection and security testing
I have successfully secured so many companies, and my expertise is trusted in the industry for ensuring robust cybersecurity practices.
Steps for completing your project
After purchasing the project, send requirements so Monoroanjan can start the project.
Delivery time starts when Monoroanjan receives requirements from you.
Monoroanjan works on your project following the steps below.
Revisions may occur after the delivery date.
Monoroanjan works on your project following the steps below.
1. Information Gathering 2. Reconnaissance 3. Discovery and Scanning 4. Vulnerability Assessment 5. Exploitation 6. Report writing