You will get Web Application penetration testing and recommendations for improvement

You will get Web Application penetration testing and recommendations for improvement

Project details
You will get a penetration testing and security assessment of your website (1 target only). The testing is a combination of both Manual and Automated Testing.
The price includes Black Box pen-testing.
You will receive in deliverables the following reports:
1. Intelligence Gathering Report
2. Vulnerability Assessment Draft
3. Penetration Testing Draft
4. Final Report, which includes 2 & 3
If the scope of your project includes more than one target, please get in touch with me for an estimated cost based on your scope.
The price includes Black Box pen-testing.
You will receive in deliverables the following reports:
1. Intelligence Gathering Report
2. Vulnerability Assessment Draft
3. Penetration Testing Draft
4. Final Report, which includes 2 & 3
If the scope of your project includes more than one target, please get in touch with me for an estimated cost based on your scope.
Cybersecurity Expertise
Data Protection, Cyber Threat Intelligence, Risk AssessmentTechnology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, CRM, Email SystemCybersecurity Regulation
GDPR, ISO, PCI DSS, SOC 2What's included
Service Tiers |
Starter
$1,100
|
Standard
$1,200
|
Advanced
$1,600
|
---|---|---|---|
Delivery Time | 18 days | 13 days | 10 days |
Application Audit | |||
Project Plan | |||
Cost Estimation |
Frequently asked questions
About MD. Tamjidul
Information Security Specialist | 6+ years experience
Dhaka, Bangladesh - 3:40 am local time
I'm a professional penetration tester and ethical hacker, as well as a digital forensics and Website security specialist. I've completed over 230 penetration tests and security assessments so far. The majority of them are focused on web applications that are developed using a variety of technologies and frameworks, as well as server security testing and hardening. For those who are interested, sample reports can be supplied.
I will create a cybersecurity plan for you that will safeguard all of your websites, laptops, phones, and internet accounts. Protect your online company by testing your website to find all security flaws before they are exploited by fraudsters! I'll perform a thorough security audit on your website or online application.
In my deliverables, I create Professional reports detailing each vulnerability I find, proofs-of-concept, and solutions to how I fix those vulnerabilities. Provide The Right Way To Prevent Vulnerabilities
✦▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬✦
🌟 AS A PENTESTER I CAN HELP YOU WITH: 🌟
► Web Application Pentesting and Vulnerability Analysis based on OWASP TOP 10 ( SaaS, PaaS, IaaS, DaaS)
► Network Penetration Testing
► IT Support
► AWS, GCP, Azure, VPS, SWH - Pentesting
► PCI DSS, HIPAA, ISO 27001, SOC, GDPR - Security Assessment
► Protect your online accounts from hackers.
► Infrastructure Testing
► Wifi Security / Home Network Security
► Open source intelligence
► Social Engineering
✦▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬✦
🌟 WHY CHOOSE ME OVER OTHER FREELANCERS? 🌟
✅ Over-Delivering: This is core to my work as a Freelancer. My focus is on GIVING more than what I expect to RECEIVE.
✅ Responsiveness: Being extremely responsive and keeping all lines of communication readily open with my Clients.
✅ Kindness: One of the biggest aspects of my life that I implement in every facet of my life. Treating everyone with respect, understanding all situations, and genuinely wanting to IMPROVE my Client's situations.
✦▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬✦
🌟 EDUCATION, Licenses & certifications 🌟
✅ 6+ years of experience
✅ B.S. Computer Science
✅ Getting Started with Vulnerability Analysis and Management - EC-Council
Issued Oct 2021
Credential ID 122294
✅ Windows Penetration Testing Essentials - EC-Council
Issued Sep 2021
Credential ID 6936
✅ OSINT for Hackers and Penetration Testers - EC-Council
Issued Aug 2021
Credential ID 6776
✅ Deep Dive into Network Assessments - EC-Council
Issued Sep 2021
Credential ID 6993
✅ Ransomware Survival Guide - EC-Council
Issued Aug 2021
Credential ID 6752
✅ How Hackers Find SQL Injections In Minutes With Sqlmap - EC-Council
Issued Aug 2021
Credential ID 6748
✅ ISACA CISM Certified Information Security Manager - EC-Council
Issued Sep 2021
Credential ID 6921
✦▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬✦
Steps for completing your project
After purchasing the project, send requirements so MD. Tamjidul can start the project.
Delivery time starts when MD. Tamjidul receives requirements from you.
MD. Tamjidul works on your project following the steps below.
Revisions may occur after the delivery date.
Information Gathering
I do reconnaissance and search for sensitive information that can be found and left by mistake. The organization being tested will provide the penetration tester with general information about in-scope targets.
Vulnerability Assessment
Using various scanning tools, I will run it on the target and check if the developer uses any potentially vulnerable library that can help us find Exploits from the application. Finally, I will make the report for the findings in a draft.