You will get Professional Web Application Penetration Testing Following OWASP TOP 10.
Md Tanjilur R.
You will get Professional Web Application Penetration Testing Following OWASP TOP 10.
Md Tanjilur R.
Project details
Protect your online business by testing your website to discover all the security vulnerabilities before cybercriminals exploit them!
I will conduct a complete security review of your website/web application (with or without authentication).
In my report, I will conduct a thorough review and cover the following topics:
✔ Information Gathering
✔ Scanning
✔ Test for XSS
✔ Test for SQL injections
✔ Test for CSRF
✔ Test for Insecure CORS
✔ Test for URL redirection
✔ Test for LFI & RFI
✔ Test for critical file uploading
✔ Test for Command injection
✔ Test for directory Traversing
✔ Test for SSRF
✔ Test for SSTI
✔ Test for Authentication and Authorization Bypass
✔ Test for IDORS
✔ Test for Sensitive Information leak
✔ Test for Insecure deserialization
✔ OWASP top 10 and other vulnerabilities
✔ Deep crawls and analysis
✔ Open ports on your hosting server.
✔ Professional Report
✔ Industry Standard Cyber Security
You will receive a detailed report listing all of my findings and mitigation recommendations (guidance on how to resolve the discovered security vulnerabilities).
I will conduct a complete security review of your website/web application (with or without authentication).
In my report, I will conduct a thorough review and cover the following topics:
✔ Information Gathering
✔ Scanning
✔ Test for XSS
✔ Test for SQL injections
✔ Test for CSRF
✔ Test for Insecure CORS
✔ Test for URL redirection
✔ Test for LFI & RFI
✔ Test for critical file uploading
✔ Test for Command injection
✔ Test for directory Traversing
✔ Test for SSRF
✔ Test for SSTI
✔ Test for Authentication and Authorization Bypass
✔ Test for IDORS
✔ Test for Sensitive Information leak
✔ Test for Insecure deserialization
✔ OWASP top 10 and other vulnerabilities
✔ Deep crawls and analysis
✔ Open ports on your hosting server.
✔ Professional Report
✔ Industry Standard Cyber Security
You will receive a detailed report listing all of my findings and mitigation recommendations (guidance on how to resolve the discovered security vulnerabilities).
Cybersecurity Assessment Type
Penetration TestingCybersecurity Expertise
Configuration Management, Audit, Risk AssessmentTechnology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, Email System, Mobile DeviceCybersecurity Regulation
GDPR, ISO, PCI DSS, SOC 2$500
- Delivery Time 5 days
- Application Audit
- Project Plan
- Cost Estimation
Frequently asked questions
About Md Tanjilur
Ethical Hacker | Penetration Tester | Cyber Security Analyst
Dhaka, Bangladesh - 10:25 am local time
I have 18 years of work experience in Penetration Testing, Cyber Security, and Information Security. I have worked in different roles and responsibilities during my career. My diverse work experience provided me with an opportunity to become proficient in a wide range of skills and technologies. I guarantee my work and make sure my clients are 100% satisfied with the work.
❖ In my profession, I have achieved the following certificates:
• Certified Ethical Hacker (C|EH).
• Certified Cyber Security Analyst (CCSA)
• Certified Information System Auditor (CISA).
• Microsoft Certified Professional (MCP).
• Microsoft Certified System Engineer (MCSE).
• Microsoft Certified Database Administrator (MCDBA).
• Completed a Course Microsoft Certified System Administrator (MCSA).
• Completed a Course on HP, IBM, Dell Server, and Workstation.
• Completed a Course on Cisco Switch, Router, and Firewall.
• Linux System Administration Training (Redhat Certified Engineer Track)
❖ I am an expert and capable of testing the below Vulnerabilities and providing you with a report about your website security.
• Server Security Misconfiguration
• Broken Authentication and Session Management
• Sensitive Data Exposure
• Insecure OS/Firmware
• Automotive Security Misconfiguration
• Cross-Site Scripting (XSS)
• Broken Access Control (BAC)
• Cross-Site Request Forgery (CSRF)
• Application-level denial-of-service (DOS)
• Server-Side Injection
• Client-Side Injection
• Sensitive Data Exposure
• Malware Detection
• Broken Cryptography
• Location Tracking
❖ Penetration Testing Tools:
Kali Linux, Burpsuite, Acunetix, Nessus, Metasploit, sqlmap, Netcat, Nmap, Nikto, Mimikatz, Hydra, Gobuster, Google Hacking, Maltego, Recon-ng, Wappalyzer, OWASP ZAP, Custom Tools/Scripts plus many more.
My passion is fighting malware and cybercriminals, not taking money for quick and temporary solutions to a problem. I took great pride in the quality of my work and was willing to go the extra mile to make sure the project was completed beyond satisfactory results.
Let me know how I can help you secure your environment.
Steps for completing your project
After purchasing the project, send requirements so Md Tanjilur can start the project.
Delivery time starts when Md Tanjilur receives requirements from you.
Md Tanjilur works on your project following the steps below.
Revisions may occur after the delivery date.
Information Gathering
Collect as much information as possible to gain a better understanding of the test environment.
Scanning and Evaluation
Perform an automated scan on the target along with manual verification of findings.