You will get Web/Mobile/API Application Penetration Testing
Manish Kumar P.
Top Rated
You will get Web/Mobile/API Application Penetration Testing
Manish Kumar P.
Top Rated
Automated WAPT
Web Applications Vulnerability Assessment. 1 Revel.
- Delivery Time 7 days
- Application Audit
- Cost Estimation
7 days
delivery —
Oct 14, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Manish Kumar gets paid once you are satisfied with the work.
Project details
As the front door to many organizations’ Online offerings, web applications deserve the utmost attention in security.
we live and breathe application security, To complement this rigor and depth, we are programmers, and regularly write custom scripts and test harnesses during engagements to allow interaction with custom or non-standard applications, data encapsulation, or web services.
Addition Service
Code reviews can pinpoint exploitable Security flaws which simply cannot be found in black-box assessments.
Access to code allows security assessment to pinpoint numerous potentially high-risk flaws which would not otherwise be visible, including:
Unreferenced API methods, endpoints, or parameter values with powerful functionality, which are callable but not displayed in the UI
Vulnerable code paths, which may be seldom encountered within normal application usage;
Vulnerable server-side calls which may allow onward compromise but do not display significant feedback to the attacker as to their operation (examples could include “blind injection” bugs or logging of sensitive data on the server side);
we live and breathe application security, To complement this rigor and depth, we are programmers, and regularly write custom scripts and test harnesses during engagements to allow interaction with custom or non-standard applications, data encapsulation, or web services.
Addition Service
Code reviews can pinpoint exploitable Security flaws which simply cannot be found in black-box assessments.
Access to code allows security assessment to pinpoint numerous potentially high-risk flaws which would not otherwise be visible, including:
Unreferenced API methods, endpoints, or parameter values with powerful functionality, which are callable but not displayed in the UI
Vulnerable code paths, which may be seldom encountered within normal application usage;
Vulnerable server-side calls which may allow onward compromise but do not display significant feedback to the attacker as to their operation (examples could include “blind injection” bugs or logging of sensitive data on the server side);
Cybersecurity Assessment Type
Penetration TestingCybersecurity Expertise
Audit, Risk Assessment, Gap AnalysisTechnology Type
Web ApplicationCybersecurity Regulation
ISO, PCI DSSWhat's included
Service Tiers |
Starter
$1,500
|
Standard
$2,000
|
Advanced
$3,000
|
---|---|---|---|
Delivery Time | 7 days | 10 days | 16 days |
Application Audit | |||
Project Plan | - | - | |
Cost Estimation |
Optional add-ons
You can add these on the next page.
Fast Delivery
+$500 - $1,000
Mobile Application
(+ 10 Days)
+$1,500
API Security Testing
(+ 10 Days)
+$1,500
Source Code Review
(+ 10 Days)
+$3,000Frequently asked questions
3 reviews
(3)
(0)
(0)
(0)
(0)
This project doesn't have any reviews.
SP
Soujanya P.
May 31, 2024
MCQ's - Offensive Security
Helped us with his expertise, Cooperative throughout the project.
NB
Nadia B.
Mar 23, 2023
Indian cybersecurity specialists - teamleads, CTO, CISO, CIO (INDIA only)
Manish helped us a lot, he is a great professional who knows a lot about cybersecurity!
SC
SHAWN C.
Oct 2, 2022
Cybersecurity vulnerability analysis and scanner configurations
The freelancer has met my expectations, he is very pleasant in explaining the details when asked questions. He is technically sound in the Cybersecurity domain knowledge. I would recommend him as a great resource for Cybersecurity related issues and their remediation. I enjoyed working with him and definitely will hire him again when needed.
About Manish Kumar
Expert-Vetted Penetration Testing | AppSec | AI Cyber Security InfoSec
100%
Job Success
Lucknow, India - 11:22 pm local time
have a deep understanding of the latest cybersecurity threats and trends, and I am well-versed in a wide range of security tools and techniques. I have experience in conducting Penetration testing on different environments including web, mobile, and network. I have also been successful in identifying and exploiting various vulnerabilities in different systems, which helped my clients to improve their security posture.
have experience in Threat Modelling, Adversary Simulation, and Red Team Operations, which helped me to understand the tactics, techniques, and procedures used by the attackers and how to emulate them in an organization's environment. I have also experience in Architecture reviews and Application security, which helped me to identify the vulnerabilities in the design and implementation of the systems.
have experience in setting up DevSecOps pipelines which helped my clients to continuously integrate and deploy security in the software development lifecycle. I am well-versed in the OWASP SAMM framework and have experience in implementing and maintaining the framework for application security.
Also have experience in implementing and maintaining the CAASM framework, which helped my clients to continuously assess and adapt to risk. I am familiar with the CMMC standards and have experience in helping organizations to achieve the certification. I am well-versed in the ISO 27001 standard and have experience in implementing and maintaining the standard in different organizations.
I am confident that my skills and experience make me a strong candidate for this position and I am excited about the opportunity to work with your team to help protect your organization from cyber threats.
Steps for completing your project
After purchasing the project, send requirements so Manish Kumar can start the project.
Delivery time starts when Manish Kumar receives requirements from you.
Manish Kumar works on your project following the steps below.
Revisions may occur after the delivery date.
Starting of Testing
Completion of Automated scan