order today or Request a quote

Strengthen your digital defense strategy with our cyber security services. Choose to purchase our services today, or get in touch for a customised quote that suits your specific needs. Our team is dedicated to help ensure your digital space stays protected.

Showing all 5 results

Our penetration test service offers in-depth assessment and evaluation of network security, (web)application vulnerabilities, and other points of exploitation. Together, we establish the goals and the scope of the tests upfront to ensure the outcome aligns precisely with your security objectives. Our pentests include:

  • Network scanning: Utilizing automated tools to scan the target network for open ports, services, and potential vulnerabilities in network devices.
  • Vulnerability identification: Identifying and cataloguing known vulnerabilities in the application, including software and configuration weaknesses.
  • Assessment of patch levels: Evaluating the status of software patches and updates to determine if systems are up to date with the latest security fixes.
  • Web application scanning: Assessing web applications for common weaknesses with maximum attention for the vulnerabilities in the OWASP Top 10, such as SQL injection, cross-site scripting (XSS).
  • Manual testing: Conducting manual tests using human logic to validate and further investigate potential vulnerabilities, in line with the Penetration Testing Execution Standard (PTES).
  • Risk prioritisation: Assigning a risk level to identified vulnerabilities based on factors such as the potential impact, likelihood of exploitation, and the context of the organisation.
  • Custom report: Creating a detailed report that includes a list of identified vulnerabilities, their risk levels, and recommendations for remediation.

  • We can start the pentest on an agreed-upon date, even within a short timeframe.
  • Always a fixed price upfront with no surprises afterwards.
  • Communication takes place with a designated contact person from your team to address any urgent issues that may arise during the pentest.
  • We adhere to the Penetration Testing Execution Standard (PTES) as a standardised testing methodology.
  • Retest on specific issues is possible, quoted separately upfront.
  • Performing Denial-of-Service tests is explicitly outside the scope.
  • Choice of blackbox, whitebox, or greybox testing:

Blackbox
Greybox
Whitebox
Goal
Mimic a true cyber attack
Assess vulnerability to insider's threats
Simulate an attack where a hacker gains access to a priviliged account
Access level
Zero access of internal information
Account available and some internal information
Complete open access to applications and systems
Test
Can only be done by trial and error method
Data domain and internal boundaries can be tested, if known
Data domain and internal boundaries can be tested more thoroughly
Time
Least time consuming
Good balance of time and depth of testing
Most exhaustive and time consuming

  • Blackbox
  • Greybox 3
  • Popular
    Greybox 5
  • Greybox 7
  • Whitebox
BlackboxGreybox 3
Popular
Greybox 5
Greybox 7Whitebox
1400
4500
7000
8650
7000
Test duration1 day3 days5 days7 days5 days
Total duration start to report3 days7 days14 days16 days14 days
Leaking technical information
Application management
Connection safety
Use of standard accounts
Password policy
Authentication requirements
Sequencing
Horizontal escalation
Vertical escalation
Session management
CSRF
Cookies
Input validation
Output validation
API security
Buy NowBuy NowBuy NowBuy NowBuy Now

Our one-day blackbox pentest costs 1400 euro and has a total duration of 3 days from start to report. It includes the following checks:

  • Leaking technical information
  • Connection safety
  • Use of standard accounts
  • Password policy

Buy now

Our 3-day greybox pentest costs 4500 euro and has a total duration of 7 days from start to report. It includes the following checks:

  • Leaking technical information
  • Application management
  • Connection safety
  • Use of standard accounts
  • Password policy
  • Authentication requirements
  • CSRF
  • Cookies
  • Input validation
  • Output validation

Buy now

Our 5-day greybox pentest costs 7000 euro and has a total duration of 14 days from start to report. It includes the following checks:

  • Leaking technical information
  • Application management
  • Connection safety
  • Use of standard accounts
  • Password policy
  • Authentication requirements
  • Sequencing
  • Horizontal escalation
  • Vertical escalation
  • Session management
  • CSRF
  • Cookies
  • Input validation
  • Output validation

Buy now

Our 7-day greybox pentest costs 8650 euro and has a total duration of 16 days from start to report. It includes the following checks:

  • Leaking technical information
  • Application management
  • Connection safety
  • Use of standard accounts
  • Password policy
  • Authentication requirements
  • Sequencing
  • Horizontal escalation
  • Vertical escalation
  • Session management
  • CSRF
  • Cookies
  • Input validation
  • Output validation
  • API security

Buy now

Our 5-day whitebox pentest costs 7000 euro and has a total duration of 14 days from start to report. It includes the following checks:

  • Leaking technical information
  • Application management
  • Connection safety
  • Use of standard accounts
  • Password policy
  • Authentication requirements
  • Sequencing
  • Horizontal escalation
  • Vertical escalation
  • Session management
  • CSRF
  • Cookies
  • Input validation
  • Output validation

Buy now