You will get Professional Web Application Penetration Testing Following OWASP TOP 10.

Let a pro handle the details
Buy Assessments & Penetration Testing services from Md Tanjilur, priced and ready to go.
You will get Professional Web Application Penetration Testing Following OWASP TOP 10.
- Delivery Time 5 days
- Application Audit
- Project Plan
- Cost Estimation
5 days
delivery —
Oct 4, 2023
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Md Tanjilur gets paid once you are satisfied with the work.

Let a pro handle the details
Buy Assessments & Penetration Testing services from Md Tanjilur, priced and ready to go.
Project details
Protect your online business by testing your website to discover all the security vulnerabilities before cybercriminals exploit them!
I will conduct a complete security review of your website/web application (with or without authentication).
In my report, I will conduct a thorough review and cover the following topics:
✔ Information Gathering
✔ Scanning
✔ Test for XSS
✔ Test for SQL injections
✔ Test for CSRF
✔ Test for Insecure CORS
✔ Test for URL redirection
✔ Test for LFI & RFI
✔ Test for critical file uploading
✔ Test for Command injection
✔ Test for directory Traversing
✔ Test for SSRF
✔ Test for SSTI
✔ Test for Authentication and Authorization Bypass
✔ Test for IDORS
✔ Test for Sensitive Information leak
✔ Test for Insecure deserialization
✔ OWASP top 10 and other vulnerabilities
✔ Deep crawls and analysis
✔ Open ports on your hosting server.
✔ Professional Report
✔ Industry Standard Cyber Security
You will receive a detailed report listing all of my findings and mitigation recommendations (guidance on how to resolve the discovered security vulnerabilities).
I will conduct a complete security review of your website/web application (with or without authentication).
In my report, I will conduct a thorough review and cover the following topics:
✔ Information Gathering
✔ Scanning
✔ Test for XSS
✔ Test for SQL injections
✔ Test for CSRF
✔ Test for Insecure CORS
✔ Test for URL redirection
✔ Test for LFI & RFI
✔ Test for critical file uploading
✔ Test for Command injection
✔ Test for directory Traversing
✔ Test for SSRF
✔ Test for SSTI
✔ Test for Authentication and Authorization Bypass
✔ Test for IDORS
✔ Test for Sensitive Information leak
✔ Test for Insecure deserialization
✔ OWASP top 10 and other vulnerabilities
✔ Deep crawls and analysis
✔ Open ports on your hosting server.
✔ Professional Report
✔ Industry Standard Cyber Security
You will receive a detailed report listing all of my findings and mitigation recommendations (guidance on how to resolve the discovered security vulnerabilities).
Cybersecurity Expertise
Configuration Management, Audit, Risk Assessment
Technology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, Email System, Mobile Device
Cybersecurity Regulation
GDPR, ISO, PCI DSS, SOC 2
$300
- Delivery Time 5 days
- Application Audit
- Project Plan
- Cost Estimation
Frequently asked questions
About Md Tanjilur
Ethical Hacker | Penetration Tester | Cyber Security Expert
Ethical Hacker | Penetration Tester | Cyber Security Expert
Dhaka, Bangladesh
- 8:13 pm local time
I have 14 years of work experience in Penetration Testing, Cyber Security, and Information Security. I have worked in different roles and responsibilities during my career. My diverse work experience provided me with an opportunity to become proficient in a wide range of skills and technologies. I guarantee my work and make sure my clients are 100% satisfied with the work.
❖ In my profession, I have achieved the following certificates:
• Certified Ethical Hacker (C|EH).
• Certified Information System Auditor (CISA).
• Microsoft Certified Professional (MCP).
• Microsoft Certified System Engineer (MCSE).
• Microsoft Certified Database Administrator (MCDBA).
• Completed a Course Microsoft Certified System Administrator (MCSA).
• Completed a Course on HP, IBM, Dell Server, and Workstation.
• Completed a Course on Cisco Switch, Router & Firewall.
• Linux System Administration Training (Redhat Certified Engineer Track)
❖ I am an expert and capable to test the below Vulnerabilities and provide you with a report about your website security.
• Server Security Misconfiguration
• Broken Authentication and Session Management
• Sensitive Data Exposure
• Insecure OS/Firmware
• Automotive Security Misconfiguration
• Cross-Site Scripting (XSS)
• Broken Access Control (BAC)
• Cross-Site Request Forgery (CSRF)
• Application-Level Denial-of-Service (DOS)
• Server-Side Injection
• Client-Side Injection
• Sensitive Data Exposure
• Malware Detection
• Broken Cryptography
• Location Tracking
❖ Expert In:
• Application Penetration Testing with the recommendation for remediation based
on OWASP guidelines.
• Complete security assessment of the Application with the recommendation for remediation
• Cloud (AWS) infrastructure complete vulnerability assessment, security & penetration testing with the recommendation for remediation
• Static and Dynamic code analysis (SAST & DAST) with the recommendation for remediation
• Reconnaissance - Open Source Intelligence (OSINT) using DataSploit, Spiderfoot, foca pro, Buscador, Maltego, Recon-ng, Shodan, Sublist3r, theHarvester etc.
• API Security
• Malware, Phishing, Breach, data leakage detection
• Firewall audit and configure
• WordPress Theme, Plugin Virus, Malware detection, and removal
• Security and penetration testing trainer
• Android and iOS application vulnerability detection and security testing
• Security Hardening
❖ Penetration Testing Tools:
Kali Linux, Maltego, Recon-ng, Google Hacking, Wappalyzer, Nmap, Nikto, Burpsuite, OWASP ZAP, Acunetix, Nessus, OpenVAS, Netcat, Metasploit, sqlmap, Mimikatz, Hydra, Gobuster, Custom Tools/Scripts plus many more.
My passion is for fighting malware and cybercriminals, not for taking money for quick and temporary solutions to a problem. I took great pride in the quality of my work and willing to do the extra mile to make sure the project is completed beyond satisfactory results.
Let me know how I can help you secure your environment.
Steps for completing your project
After purchasing the project, send requirements so Md Tanjilur can start the project.
Delivery time starts when Md Tanjilur receives requirements from you.
Md Tanjilur works on your project following the steps below.
Revisions may occur after the delivery date.
Information Gathering
Collect as much information as possible to gain a better understanding of the test environment.
Scanning and Evaluation
Perform an automated scan on the target along with manual verification of findings.