Pricing

Lead time: 7 days

Small Package

For Websites with or without contact form

Lead time: 14 days

Large Package

For Web Apps,
E-commerce sites or Dynamic Apps

Lead time: 7 days

API Package

For Web Apps providing API functionality

Lead time: 7 days

AWS Package

899 €

per domain

Buy

Tested Vulnerabilities

  • weak passwords
  • malware
  • cross-site scripting (XSS)
  • vulnerable software, plugins and themes
  • distributed denial-of-service (DDoS) attacks
  • Structured Query Language (SQL) Injections
  • Security Misconfigurations (CMS)
  • HTTP instead of HTTPS
  • XML-RPC Exploitation
  • Sensitive Data Exposure

1499 €

per domain

Buy

Tested Vulnerabilities

All vulnerabilities included in Small Package plus:

  • Sensitive Data Exposure
  • Broken Access Control
  • Cryptographic Failures
  • Injection
  • Insecure Design
  • Security Misconfigurations (OWASP)
  • Vulnerable and Outdated Components
  • Identification and Authentication Failures
  • Software and Data Integrity Failures
  • Security Logging and Monitoring Failures
  • Server-Side Request Forgery (SSRF)

1199 €

per domain

Buy

Tested Vulnerabilities

  • Broken Object Level Authorization

  • Broken Authentication

  • Broken Object Property Level Authorization

  • Unrestricted Resource Consumption

  • Broken Function Level Authorization

  • Unrestricted Access to Sensitive Business Flows

  • Server Side Request Forgery

  • Security Misconfiguration

  • Improper Inventory Management

  • Unsafe Consumption of APIs

2499 €

starting from

Tested Vulnerabilities

  • Cloud, container or orchestration configuration
  • Injection flaws
  • Improper authentication & authorization
  • CI/CD pipeline & software supply chain flaws
  • Insecure secrets storage
  • Over-permissive or insecure network policies
  • Using components with known vulnerabilities
  • Improper assets management
  • Inadequate ‘compute’ resource quota limits
  • Ineffective logging & monitoring

All our offerings include a vulnerability report that outlines recommended mitigation strategies.

Need some guidance?

Look at our blog articles for more information on penetration testing

10 Benefits you miss out on when not utilizing pen testing

Penetration testing (or "pen-testing") is a critical component of any robust cybersecurity strategy. It involves simulating attacks on your systems to identify vulnerabilities before malicious hackers can exploit them. Despite its importance, many organizations...

2024’s Major Cybersecurity Failures: Could Penetration Testing Have Made a Difference?

It probably hasn’t been too long ago that you saw a headline about a major company that has experienced an impactful cybersecurity incident. One of the most recent headlines has been the crowdstrike outage. A report from Guy Carpenter unveiled that insured losses...

Deliverables of pen-testing

Structure and content of a pen-testing progress status update The pen-testing project is initiated, the requirements including the testing-environment are agreed and the pen-testing team has started the actual testing. The actual pen-testing can take from 7 up to 20...

Pen-testing process – how it works in a nutshell

Decision to utilize pentesting for security improvement   The pen-testing journey starts when the business owner decides to utilize its power to foster cybersecurity and reduce or avoid negative business impacts. The decision can be part of an overall security...

Top Ten Security Insights: OWASP’s Essential Guide

Using a cybersecurity framework as a basis for pentesting ensures standardized, comprehensive and efficient security assessments by leveraging industry best practices and guidelines. It helps in managing risks effectively, ensuring regulatory compliance, and...

Your Security, Our Priority: Hear What Our Clients Say!

Trusting your pen-testing team is the key component of successful and effective cooperation as well as getting best results to improve your cybersecurity environment. One of the aspects to fostering trust in the cooperation is the feedback of customers working...

In ethical hackers for pen-tests we trust

When it comes to improving the IT security environment, pen-testing serves as a major tool to identify possible threats and vulnerabilities without an immediate negative impact on the business. Ethical hackers, also known as white-hat hackers, are cybersecurity...

Typical use cases of pen-testing utilization

Companies consider cybersecurity as the number 1 priority topic when it comes to taking business risk management measures, as outlined, for example, in the most recent risk barometer report from Allianz. How did the businesses without extensive internal cybersecurity...

Maximize the value of pen-testing

With our experience gathered in multiple customer projects we observed multiple times a huge value potential for businesses utilizing pen-testing services for their cybersecurity targets. While executing software development or standard software integration projects...

Do you think you are cyber-safe?

As digital landscapes evolve, so do the cyberthreats that businesses face every day. However, not everyone has their own team of ethical hackers whose job it is to uncover all loopholes in your organization’s infrastructure. Recognizing this, we’ve launched our...