Pricing

1. Vulnerability Assessment (VA)

Vulnerability Assessment is often a starting point in cyber security tests. Your websites, operating systems and networks will be scanned for known and common vulnerabilities.
No.ItemDescriptionUnitItem Price
1Web Vulnerability AssessmentVulnerability scans use automated tools, with some manual support, to identify known weaknesses in a target enterprise.
Automated reports will be provided.
01 Website URLContact us for pricing
2External OS and Network Vulnerability AssessmentUsing Rapid7 Nexpose / Tenable Nessus tools to scan automatically.
- The scan is performed OUTSIDE the firewalls protecting the sytems.
- Automated report will be provided.
Block 5 IPs / scanContact us for pricing
3Internal OS and Network Vulnerability AssessmentUsing Rapid7 Nexpose / Tenable Nessus tools to scan automatically.
- The scan is performed INSIDE the firewalls protecting the sytems.
- Automated report will be provided.
Block 5 IPs / scanContact us for pricing

2. Penetration Testing (PT)

After Vulnerability Assessment, Penetration Testing will further help you to understand fully how your websites, mobile applications, operating systems and networks could be exploited using hackers’ techniques
No.ItemDescriptionUnitItem Price
1Web Penetration TestingSecurity researchers to manually reveal security vulnerabilities in web sites. Detail security assessment report will be given.
- Testing type: Grey-box
- Penetration testing in both auto and manual modes
- Reports with detail findings, proofs and recommendation.
- Follow OWASP Web Top 10 Standard
- Malicious Input Checks
- Session Violation checks
- Access Control Security Analysis
- Testing to be done in UAT or staging environment
- 2 tests required : Before and after security fixing.
01 Website URLContact us for pricing
2Mobile Penetration TestingSecurity researchers to manually reveal security vulnerabilities in iOS and Android applications. Detail security assessment report will be given.
- Testing type: Grey-box
- Penetration testing in manual and auto modes
- Reports with detail findings, proofs and recommendation.
- Follow OWASP Mobile Top 10 Standard
- Dynamic Runtime Analysis (Debugging, Memory analysis, IPC mechanisms and app components)
- Network Analysis (Certificate pinning, …)
- Static Analysis (Reverse Engineering)
- Fuzzing APIs called from own mobile apps.
- Testing to be done in UAT or staging environment
- 2 tests required : Before and after security fixing.
01 ApplicationContact us for pricing
3OS and Network Penetration TestingSecurity researchers to manually reveal security vulnerabilities in operating systems and networks. Detail security assessment report will be given.
- Testing type: Grey-box / Black-box
- Automatic scan for vulnerabilities by security tools.
- Manually identify and exploit vulnerabilities in your networks, systems and network devices.
- Reports with detail findings, proofs and recommendation.
- Testing to be done in UAT or staging environment
- 2 tests required : Before and after security fixing.
1 IPContact us for pricing

3. Security Code Review

Security code review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places.
No.ItemDescriptionUnitItem Price
1Security Code ReviewSecurity experts in software and security team manually review source code for security holes.01 ApplicationContact us for pricing