You will get Vulnerability Assessment & Report covering OWASP 2021 for your Organization

Steffin S.
Steffin S. Steffin S.
4.9
Top Rated

Let a pro handle the details

Buy Assessments & Penetration Testing services from Steffin, priced and ready to go.

You will get Vulnerability Assessment & Report covering OWASP 2021 for your Organization

Steffin S.
Steffin S. Steffin S.
4.9
Top Rated

Select service tier

  • Delivery Time 3 days
    • Application Audit

3 days delivery — Feb 27, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Steffin gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Steffin, priced and ready to go.

Project details

You will get professional penetration testing followed by a report that provides a good outlook on the vulnerabilities and fixes for the same.

Penetration testing is conducted by a certified professional (OSCP) who has handled many different projects. The web app test would be done based on the latest 2021 OWASP Top 10 and Other bugs would also be tested. Manual testing would be preferred over automated scanners as manual testing would produce less network noise and better results.
Cybersecurity Expertise
Audit, Cyber Threat Intelligence, Risk Assessment
Technology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application
Cybersecurity Regulation
GDPR, ISO, PCI DSS, SOC 2
What's included
Service Tiers
Starter
$200
Standard
$300
Advanced
$500
Delivery Time
3 days
5 days
6 days
Application Audit
Project Plan
-
Cost Estimation
-
-
Optional add-ons You can add these on the next page.
Fast Delivery
+$100 - $200

Frequently asked questions

4.9
45 reviews
3 stars
(0)
2 stars
(0)
1 star
(0)
Rating breakdown
Availability
5.0
Deadlines
5.0
Skills
4.9
Quality
4.9
Cooperation
5.0
Communication
5.0

MC

Mike C.
5.00
Feb 6, 2024
Penetration Testing of Web App

KK

Kevon K.
5.00
Feb 5, 2024
Consultant Good work. Quick and precise

CN

Corey N.
5.00
Jan 1, 2024
Penetration Testing Application Went above and beyond with availability and patience as we completed some further needed modules that required testing. This was our third pentest , yet Steffin was still able to find a handful of smaller flaws, and one large scale issue that would have resulted in the largest impact to our applications vulnerabilities. Very helpful, informative and professional along the entire process. Assisting all the way to the end result of successfully retesting and confirming correct procedures were in place to prevent any recurring issues.

PY

Pramod Y.
5.00
Dec 27, 2023
Pen test for website

CN

Chan N.
5.00
Nov 20, 2023
Penetration test of backend-less app
Steffin S.

About Steffin

Steffin S.
Penetration Tester, Information Security Expert , Application Security
100% Job Success
4.9  (45 reviews)
Kozhikode, India - 10:27 pm local time
🔢 As a seasoned Penetration Tester, I have a proven track record of conducting and leading successful security audits, web application penetration tests, and red team engagements for a diverse range of clients. My experience ranges from working with multinational corporations with large-scale infrastructures to smaller companies seeking enhanced security measures for competitive advantage.

As a security engineer, my day-to-day responsibilities revolve around leveraging my expertise in penetration testing, cyber security, and vulnerability assessment to identify and mitigate potential vulnerabilities. Through these experiences, I have comprehensively understood the prevailing technology stacks employed worldwide, allowing me to discern their security weaknesses with precision.

🚫No hacking service - I do not provide any hacking services, and I will not engage in any activities that involve gaining unauthorized access to any accounts, systems, or social media platforms. Requests for such services will be declined.

Working with me, you will:
★ Customized approach: I understand that every client's needs are unique, and I tailor my approach to meet your specific requirements. This ensures that you get the most comprehensive and effective security testing possible.
★ Timely delivery: I understand that time is of the essence when it comes to security testing, and I always deliver my reports on time, without compromising on quality.
★ Complete manual testing for your application and immediate notification if any high-impact issues are found.
★ Unlimited retesting for the fixed issues and unlimited revisions
★ Able to find critical bug classes that are often missed by automated pentests.


🔢 My stats are:
✅ Top-rated in information security and IT compliance categories
✅ Saved tens of thousands of dollars for clients by identifying critical vulnerabilities
✅ Ranked in the Top 50 at multiple bug bounty programs
✅ Supporting all time zones
✅ Long-term engagements
✅ Professional certifications (OSCP, OSEP, OSWP)

Sound like a fit?
🟢 Press '...' button and then ‘Send Message’ button in the top right-hand corner

Penetration Testing and Vulnerability Assessment Tools:
Manual Testing: Burpsuite Professional, Nuclei, Ffuf, Nmap, Postman (API testing), Metasploit Framework, SQLmap, OWASP ZAP
Automated Testing: Acunetix, Nessus, Netsparker, etc.

Penetration testing service:

1. Penetration Testing Engagement:
thorough manual and automated testing of all functionalities, including internal penetration tests and network infrastructure testing.
Professional enterprise-grade software is used, such as BurpSuite Professional, Acunetix, and Nessus.

2. Professional Report and Statistics:
A detailed report explaining the exploitation and discovery method of each vulnerability discovered, including proof-of-concept screenshots, full requests and responses, CVSS v3.0 standardized risk score, and impact.

3. Remediation Advice and Guidance:
Remediation advice was provided for all security issues discovered, including guidance on how to fix the issues and warnings associated with the impact and risk of these vulnerabilities.

4. Asset Discovery:
Active and passive methods are used to assess the digital footprint on the internet, including subdomain enumeration and service/port discovery.

5. Free Retest:
Retest all vulnerabilities present in the report included in the price to ensure implemented security controls and/or fixes are working as intended.

6. OSINT Reconnaissance:
gathering all valuable data about the company available on the internet, including any breached email addresses and related passwords available in cleartext on the internet.

7. Briefing and debriefing:
Calls or meetings are available to discuss the scope of work, the focus of the penetration testing engagement, including all subdomains, black-box or white-box engagement, account requirements, preferred hours for load testing, and any other guidance required.

Calls or meetings are available after the penetration test is completed to discuss the results of the engagement, the main issues and concerns regarding the security of the company, and any further clarification regarding any vulnerability and the associated impact or risk.

✅ The deliverable will be a professional penetration testing and vulnerability assessment report, which includes:
► Executive Summary
► Assessment Methodology
► Types of Tests
► Risk Level Classifications
► Result Summary
► Table of Findings
► Detailed Findings Each finding listed within the report will contain a CVSS score, issue description, proof of concept, remediation, and reference sections.
► Retest for issues (The vulnerabilities will be retested after they're fixed; multiple retests can be done to ensure the issues are remediated.)

My Expertise:

★ Web Application Security Testing
★ API security testing
★ Penetration Testing
★ Internal Active Directory and External Network Pentest
★ Vulnerability Assessment.

Steps for completing your project

After purchasing the project, send requirements so Steffin can start the project.

Delivery time starts when Steffin receives requirements from you.

Steffin works on your project following the steps below.

Revisions may occur after the delivery date.

Information Gathering

The first of the seven stages of penetration testing is information gathering. The organization being tested will provide the penetration tester with general information about in-scope targets.

Reconnaissance

The reconnaissance stage is crucial to thorough security testing because the penetration tester can identify additional information that may have been overlooked, unknown, or not provided. OSINT is a big part of reconnaissance.

Review the work, release payment, and leave feedback to Steffin.