Below is Pricing. I also provide custom penetration testing service.

Penetration Testing Service
Penetration Testing or pentest refers to the thorough ethical cyber security check-up, built to identify the vulnerabilities/ misconfiguration/ flaw concerning security that affects IT infra(Network/Server) and websites applications and advise to safely fix those to mitigate the chances of a malicious attack.
Pentest is more or less like a vulnerability assessment; however, there are some differences. For example, Pentest is a more in-depth analysis of potential threats due to misconfiguration or flaw or code logic flaws, while vulnerability assessment is to find device/system/IT infra meets specific security fixes. We do white, gray, and black box Penetration testing based on requirements and scenarios.
The expert pentest services that you can get from us are as follows:
Web Application Penetration Testing
Web application penetration testing is a type of pentest that identifies and stimulates sensitive cyber attacks on a Web application to gain access/gain data or exploit. Therefore, web application penetration is an essential health check-up of websites that should be performed frequently to ensure security.
There are two methods to find vulnerabilities or flaws in a Web application. One is DAST(Dynamic Application Security Testing), and the second is SAST(Static Application Security Testing). Both can be done with Tools and/or Manual testing. DAST is done during the application’s run time, and SAST is source code analysis concerning a security flaw.
The top 10 OWASP(Open Web Application Security Project – more info at https://owasp.org/www-project-top-ten/) DAST and SAST test, along with possible flaws in Web applications and recommended resolutions/ fixes, encompasses our Web Application Penetration Testing. Some penetration testing point references are as below.
- Injection Testing
- Sensitive Data Exposure Testing
- Broken Authentication and Session Management Testing
- Cross-Site Scripting Testing
- Cross-Site Request Forgery Testing
- Server-Side Request Forgery Testing
- Insecure Direct Object Reference
- Remote Code Execution Testing
- Open Redirect Testing
- Application Logic flaw and miss configuration Testing
OWASP Top 10 API Security Risks (Security frame work – JWT, OAuth2.x, SAML, IAM (Identity and Access Management), etc – 2023 ( More info at – https://owasp.org/API-Security/editions/2023/en/0x11-t10/)
- API1:2023 – Broken Object Level Authorization
- API2:2023 – Broken Authentication
- API3:2023 – Broken Object Property Level Authorization
- API4:2023 – Unrestricted Resource Consumption
- API5:2023 – Broken Function Level Authorization
- API6:2023 – Unrestricted Access to Sensitive Business Flows
- API7:2023 – Server Side Request Forgery
- API8:2023 – Security Misconfiguration
- API9:2023 – Improper Inventory Management
- API10:2023 – Unsafe Consumption of APIs
OWASP Top 10 LLM Security Risks
https://genai.owasp.org/llm-top-10/
- IT Infrastructure Penetration Testing
I also offer intricate IT infrastructure penetration testing, which involves both external (outside of the company) and internal testing (inside the company). After checking the potential threats, these are conveyed back to the business owner along with suggested mitigation. The benefits one can get from infrastructure penetration testing services are as follows:
- Easy management of vulnerabilities
- It makes the organization comply with regulatory standards
- Reduces the chances of reputation damage and the excess expense
- Gives data security assurance
The types of infrastructure penetration testing you will get from me are:
- Network Device Penetration Testing
Network device penetration testing is for understanding and removing cyberattack threats from any system. I perform efficient network device penetration testing for misconfiguration and vulnerability with context to security. In case of a switch, I try to check like BPDU message, Mac flood, Vlan Hoping, etc. And in the case of routers, I try to check for HSRP malfunction, SNMP enumeration, Info gathers from CDP, BGP enumeration, etc., and also check the vulnerability in devices.
- Network Security Device Penetration Testing
In this service, I provide vulnerability checks for proxy, firewall, and intrusion detection devices(NIDS). I check misconfigurations of TCP/IPV(4/6) stacks like TLS/SSL, SNMP, VPN, etc., by testing firewall rules and NIDS configurations for specific security issues by running tools against them.
- Linux and Windows Server Penetration Testing
My Linux and Windows server penetration testing includes all TCP/IPv(4/6) services like SMB, SNMP, NFS, SMTP, DNS, DHCP, LDAP, IMAP, POP3, FTP, KERBEROS, SSH, etc., and vulnerability checks in the overall operating system.
I perform every network check with proper planning, testing, accessing, and analyzing networks. Further, I make a complete report consisting of a comprehensive risk analysis summary and remedies.
You can contact me here also
Your message has been sent
Email: amit@amitdhanani.in
Linkedin: @amitdhanani
Meetup: @information technology meetup group
YouTube: @ittraining2023
Instagram: @ittraining2023