Web Application Penetration Test by Eva GeorgievaWeb Application Penetration Test by Eva Georgieva
Web Application Penetration TestEva Georgieva
What I will do for you:
- Test your web application to discover security issues.
- Create an extensive report with all the vulnerabilities found, risk rate them according to a standardized methodology, and let you know exactly what should be done in order for them to no longer represent a vulnerability.
The process:
1. A kick-off meeting is held with the client to discuss the website features, agree on the scope, agree on the testing method (black-box, gray-box testing), agree on the starting date of the pentest.
2. Additional details that won't be covered on the kick-off meeting can be agreed via email.
3. A start notification is sent to the client when the pentest of the service that is being tested starts.
4. The application is being tested during the agreed time-frame.
5. When the application testing finishes, a Pentest Report is sent to the client with all the vulnerabilities found.
6. After the client reviews the findings, Review Meeting is held to discuss the findings, solutions, next steps.
Contact for pricing
Service provided by
Eva Georgieva North Macedonia
Web Application Penetration TestEva Georgieva
Contact for pricing
What I will do for you:
- Test your web application to discover security issues.
- Create an extensive report with all the vulnerabilities found, risk rate them according to a standardized methodology, and let you know exactly what should be done in order for them to no longer represent a vulnerability.
The process:
1. A kick-off meeting is held with the client to discuss the website features, agree on the scope, agree on the testing method (black-box, gray-box testing), agree on the starting date of the pentest.
2. Additional details that won't be covered on the kick-off meeting can be agreed via email.
3. A start notification is sent to the client when the pentest of the service that is being tested starts.
4. The application is being tested during the agreed time-frame.
5. When the application testing finishes, a Pentest Report is sent to the client with all the vulnerabilities found.
6. After the client reviews the findings, Review Meeting is held to discuss the findings, solutions, next steps.
Contact for pricing