You will get Web/Mobile/API Application Penetration Testing

Manish Kumar P.
Manish Kumar P.
4.9
Top Rated

Let a pro handle the details

Buy Assessments & Penetration Testing services from Manish Kumar, priced and ready to go.

You will get Web/Mobile/API Application Penetration Testing

Manish Kumar P.
Manish Kumar P.
4.9
Top Rated

Select service tier

Automated WAPT

Web Applications Vulnerability Assessment. 1 Revel.

  • Delivery Time 7 days
    • Application Audit
    • Cost Estimation

7 days delivery — Oct 14, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Manish Kumar gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Manish Kumar, priced and ready to go.

Project details

As the front door to many organizations’ Online offerings, web applications deserve the utmost attention in security.
we live and breathe application security, To complement this rigor and depth, we are programmers, and regularly write custom scripts and test harnesses during engagements to allow interaction with custom or non-standard applications, data encapsulation, or web services.

Addition Service
Code reviews can pinpoint exploitable Security flaws which simply cannot be found in black-box assessments.

Access to code allows security assessment to pinpoint numerous potentially high-risk flaws which would not otherwise be visible, including:
Unreferenced API methods, endpoints, or parameter values with powerful functionality, which are callable but not displayed in the UI
Vulnerable code paths, which may be seldom encountered within normal application usage;
Vulnerable server-side calls which may allow onward compromise but do not display significant feedback to the attacker as to their operation (examples could include “blind injection” bugs or logging of sensitive data on the server side);
Cybersecurity Assessment Type
Penetration Testing
Cybersecurity Expertise
Audit, Risk Assessment, Gap Analysis
Technology Type
Web Application
Cybersecurity Regulation
ISO, PCI DSS
What's included
Service Tiers Starter
$1,500
Standard
$2,000
Advanced
$3,000
Delivery Time 7 days 10 days 16 days
Application Audit
Project Plan
-
-
Cost Estimation
Optional add-ons You can add these on the next page.
Fast Delivery
+$500 - $1,000
Mobile Application (+ 10 Days)
+$1,500
API Security Testing (+ 10 Days)
+$1,500
Source Code Review (+ 10 Days)
+$3,000

Frequently asked questions

4.9
3 reviews
100% Complete
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
Rating breakdown
Availability
4.7
Deadlines
4.7
Skills
5.0
Cooperation
5.0
Quality
5.0
Communication
5.0

SP

Soujanya P.
5.00
May 31, 2024
MCQ's - Offensive Security Helped us with his expertise, Cooperative throughout the project.

NB

Nadia B.
5.00
Mar 23, 2023
Indian cybersecurity specialists - teamleads, CTO, CISO, CIO (INDIA only) Manish helped us a lot, he is a great professional who knows a lot about cybersecurity!

SC

SHAWN C.
4.70
Oct 2, 2022
Cybersecurity vulnerability analysis and scanner configurations The freelancer has met my expectations, he is very pleasant in explaining the details when asked questions. He is technically sound in the Cybersecurity domain knowledge. I would recommend him as a great resource for Cybersecurity related issues and their remediation. I enjoyed working with him and definitely will hire him again when needed.
Manish Kumar P.

About Manish Kumar

Manish Kumar P.
Expert-Vetted Penetration Testing | AppSec | AI Cyber Security InfoSec
100% Job Success
4.9  (3 reviews)
Lucknow, India - 11:22 pm local time
Expert-Vetted | Highly experienced Cybersecurity Consultant with over a decade of experience in the field, specializing in Penetration testing and Adversary Simulation using the MITRE ATT&CK Framework..have a strong background in managing Teams of Penetration Testing, Adversary Simulation, DevSecOps, Secure Code review, Application/Network Threat modeling, Architecture Review, and Threat Hunting Teams, Application Security, Vulnerability Management, Continuous Adaptive Risk and Trust Assessment (CAASM), and running Projects for Open Web Application Security Project Software Assurance Maturity Model (OWASP SAMM), Cybersecurity Maturity Model Certification (CMMC), Setting up DevSecOps Pipeline, NIST SP 800-53, 171, CSF and ISO 27001, AI risk. ML Security.


have a deep understanding of the latest cybersecurity threats and trends, and I am well-versed in a wide range of security tools and techniques. I have experience in conducting Penetration testing on different environments including web, mobile, and network. I have also been successful in identifying and exploiting various vulnerabilities in different systems, which helped my clients to improve their security posture.

have experience in Threat Modelling, Adversary Simulation, and Red Team Operations, which helped me to understand the tactics, techniques, and procedures used by the attackers and how to emulate them in an organization's environment. I have also experience in Architecture reviews and Application security, which helped me to identify the vulnerabilities in the design and implementation of the systems.

have experience in setting up DevSecOps pipelines which helped my clients to continuously integrate and deploy security in the software development lifecycle. I am well-versed in the OWASP SAMM framework and have experience in implementing and maintaining the framework for application security.

Also have experience in implementing and maintaining the CAASM framework, which helped my clients to continuously assess and adapt to risk. I am familiar with the CMMC standards and have experience in helping organizations to achieve the certification. I am well-versed in the ISO 27001 standard and have experience in implementing and maintaining the standard in different organizations.

I am confident that my skills and experience make me a strong candidate for this position and I am excited about the opportunity to work with your team to help protect your organization from cyber threats.

Steps for completing your project

After purchasing the project, send requirements so Manish Kumar can start the project.

Delivery time starts when Manish Kumar receives requirements from you.

Manish Kumar works on your project following the steps below.

Revisions may occur after the delivery date.

Starting of Testing

Completion of Automated scan

Review the work, release payment, and leave feedback to Manish Kumar.