You will get Professional Web Application Penetration Testing Following OWASP TOP 10.

Md Tanjilur R.
Md Tanjilur R.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Md Tanjilur, priced and ready to go.

You will get Professional Web Application Penetration Testing Following OWASP TOP 10.

Md Tanjilur R.
Md Tanjilur R.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Md Tanjilur, priced and ready to go.

Project details

Protect your online business by testing your website to discover all the security vulnerabilities before cybercriminals exploit them!

I will conduct a complete security review of your website/web application (with or without authentication).

In my report, I will conduct a thorough review and cover the following topics:

✔ Information Gathering
✔ Scanning
✔ Test for XSS
✔ Test for SQL injections
✔ Test for CSRF
✔ Test for Insecure CORS
✔ Test for URL redirection
✔ Test for LFI & RFI
✔ Test for critical file uploading
✔ Test for Command injection
✔ Test for directory Traversing
✔ Test for SSRF
✔ Test for SSTI
✔ Test for Authentication and Authorization Bypass
✔ Test for IDORS
✔ Test for Sensitive Information leak
✔ Test for Insecure deserialization
✔ OWASP top 10 and other vulnerabilities
✔ Deep crawls and analysis
✔ Open ports on your hosting server.
✔ Professional Report
✔ Industry Standard Cyber Security

You will receive a detailed report listing all of my findings and mitigation recommendations (guidance on how to resolve the discovered security vulnerabilities).
Cybersecurity Assessment Type
Penetration Testing
Cybersecurity Expertise
Configuration Management, Audit, Risk Assessment
Technology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, Email System, Mobile Device
Cybersecurity Regulation
GDPR, ISO, PCI DSS, SOC 2
What's included $500 These options are included with the project scope.
$500
  • Delivery Time 5 days
    • Application Audit
    • Project Plan
    • Cost Estimation

Frequently asked questions

Md Tanjilur R.

About Md Tanjilur

Md Tanjilur R.
Ethical Hacker | Penetration Tester | Cyber Security Analyst
Dhaka, Bangladesh - 10:25 am local time
Hi, I am an Ethical Hacker and Penetration Tester. I offer personalized cyber security services for websites and web applications Penetration Testing and Vulnerability Assessment. I perform full unauthenticated and authenticated testing based on strict OWASP guidelines. I always identify weak points across the entire web application to ensure your applications and data stay safe.

I have 18 years of work experience in Penetration Testing, Cyber Security, and Information Security. I have worked in different roles and responsibilities during my career. My diverse work experience provided me with an opportunity to become proficient in a wide range of skills and technologies. I guarantee my work and make sure my clients are 100% satisfied with the work.

❖ In my profession, I have achieved the following certificates:
• Certified Ethical Hacker (C|EH).
• Certified Cyber Security Analyst (CCSA)
• Certified Information System Auditor (CISA).
• Microsoft Certified Professional (MCP).
• Microsoft Certified System Engineer (MCSE).
• Microsoft Certified Database Administrator (MCDBA).
• Completed a Course Microsoft Certified System Administrator (MCSA).
• Completed a Course on HP, IBM, Dell Server, and Workstation.
• Completed a Course on Cisco Switch, Router, and Firewall.
• Linux System Administration Training (Redhat Certified Engineer Track)

❖ I am an expert and capable of testing the below Vulnerabilities and providing you with a report about your website security.
• Server Security Misconfiguration
• Broken Authentication and Session Management
• Sensitive Data Exposure
• Insecure OS/Firmware
• Automotive Security Misconfiguration
• Cross-Site Scripting (XSS)
• Broken Access Control (BAC)
• Cross-Site Request Forgery (CSRF)
• Application-level denial-of-service (DOS)
• Server-Side Injection
• Client-Side Injection
• Sensitive Data Exposure
• Malware Detection
• Broken Cryptography
• Location Tracking

❖ Penetration Testing Tools:
Kali Linux, Burpsuite, Acunetix, Nessus, Metasploit, sqlmap, Netcat, Nmap, Nikto, Mimikatz, Hydra, Gobuster, Google Hacking, Maltego, Recon-ng, Wappalyzer, OWASP ZAP, Custom Tools/Scripts plus many more.

My passion is fighting malware and cybercriminals, not taking money for quick and temporary solutions to a problem. I took great pride in the quality of my work and was willing to go the extra mile to make sure the project was completed beyond satisfactory results.

Let me know how I can help you secure your environment.

Steps for completing your project

After purchasing the project, send requirements so Md Tanjilur can start the project.

Delivery time starts when Md Tanjilur receives requirements from you.

Md Tanjilur works on your project following the steps below.

Revisions may occur after the delivery date.

Information Gathering

Collect as much information as possible to gain a better understanding of the test environment.

Scanning and Evaluation

Perform an automated scan on the target along with manual verification of findings.

Review the work, release payment, and leave feedback to Md Tanjilur.