Penetration Testing & Cybersecurity Services for Your Business

Contact for pricing

About this service

Summary

Penetration testing services aligned with OWASP Top 10 standards to identify and mitigate vulnerabilities in web apps, mobile apps, APIs, and IT infrastructure. My testing approach uncovers critical risks, including misconfigurations to strengthen your security posture.

Process

Scope Definition
Gather project details, including target applications, endpoints, and requirements.
Reconnaissance & Mapping
Collect information about the target to identify potential entry points and vulnerabilities.
Vulnerability Assessment
Perform automated and manual scans to detect security flaws and weaknesses.
Exploitation & Testing
Simulate attacks to verify vulnerabilities and assess their impact.
Post-Exploitation Analysis
Evaluate risks, potential data breaches, and privilege escalation paths.
Reporting
Provide a detailed report with findings, risk ratings, and remediation steps.
Remediation Support
Offer guidance and consultations to address vulnerabilities effectively.
Retesting for high and critical issues (Included in price)
Verify fixes and ensure vulnerabilities are resolved.

FAQs

  • Can the delivery time be affected?

    Yes, delivery time and details can be different by the size of the project.

  • Can you test mobile applications?

    Yes. This includes both, Android and iOS. For some of the applications it is possible to ask the client to remove the SSL Pin.

  • How long would it take to test an ecommerce website?

    Usually, an ecommerce website it's roughly 4+1. 4 days testing 1 day reporting.

  • How long will it take to test my API?

    API tests are scoped based on the number of functions the API has and the by the type of calls are made e.g GET/POST/PUT etc.

  • Can you do Security Cloud Review?

    Yes, I can perform cloud reviews as well for Azure, AWS, MS365 etc.

  • Do you perform External / Internal infrastructure testing?

    Yes, I perform both external and internal infrastructure penetration testing to identify vulnerabilities such as open ports, misconfigurations, weak credentials, and firewall issues—simulating real-world attacks to strengthen your security posture.

  • Do you perform Firewall Reviews?

    Yes, I conduct firewall reviews to identify misconfigurations, validate rule sets, assess VPN and NAT settings, and ensure alignment with security best practices and compliance requirements.

What's included

  • Expert Penetration Testing & Cybersecurity Services to Secure Your Business

    Penetration testing services aligned with OWASP Top 10 standards to identify and mitigate vulnerabilities in web apps, mobile apps, APIs, and IT infrastructure. My testing approach uncovers critical risks, including misconfigurations to strengthen your security posture.

  • Web Application Testing

    Detect OWASP Top 10 vulnerabilities like SQL Injection, XSS, and Broken Authentication. Assess logic flaws, session handling, and input validation.

  • Mobile Application Testing

    Analyze data encryption, API calls, and test for reverse engineering risks. Evaluate insecure data transmission vulnerabilities.

  • API Security Testing

    Review authentication, authorization, and data exposure for REST and SOAP APIs. Test rate-limiting, security headers, and input validation.

  • Infrastructure Testing

    Perform network scans, port analysis, and firewall rule reviews. Assess VPNs and intrusion detection systems for weaknesses.

  • Deliverables

    Comprehensive Reports with risks, vulnerabilities, and proofs of concept. Remediation Plans with actionable fixes. Compliance Mapping (OWASP, CIS, NIST). Retesting Support to validate fixes. Perfect for businesses seeking secure and compliant applications!

Recommendations

(5.0)

Stefan Cristescu • Verifone

Client • May 5, 2025

Dragos was punctual and efficient from the start. Briefed just hours after our first contact, he was already testing the system. His structured, methodical approach was exactly what I needed under pressure. He spotted a subtle token reuse issue in an API flow that could’ve allowed unintended replays and proposed a clean, practical fix. I implemented it, and we were fully operational in three days. I recommend him to anyone needing top-tier, organized, hassle-free penetration testing.

Andreea Fiterău

Client • May 5, 2025

Working with Dragos was an outstanding experience. His expertise in cybersecurity is matched only by his exceptional communication skills. He explained complex concepts in a way that was clear, practical, and easy to follow. I always felt informed and supported throughout the process. I highly recommend him—10/10!


Skills and tools

Security Engineer

Security Manager

Cybersecurity Specialist

Burp Suite

Burp Suite

Chainlink

Chainlink

Docker

Docker

Oracle APEX

Oracle APEX

Solidity

Solidity

Industries

Cybersecurity
Cryptocurrency & Blockchain
Artificial Intelligence