Simplified, effective web application pen testing

We're tired of complex penetration testing services. We created a better way to show you our services

Pen test starter

This package is designed for small businesses that are just starting out with their security testing journey. It includes a basic level of testing that will identify common vulnerabilities in your systems and provide a high-level overview of your security posture.

1 web or 1 app
2 days delivery
Application audit
Pen test starter
from
£1500
Scoping form
Pen test standard

The standard package is a comprehensive security testing package that is suitable for most organisations. It includes a more detailed level of testing vulnerabilities and provides a more in-depth analysis of your security posture.

Starter + Re-test
3 days delivery
Application audit
Project plan
Pen test standard
from
£1800
Scoping form
Pen test advanced

The advanced package is designed for most organisations or those with more complex security requirements. It includes an extensive level of testing that covers all aspects of your security posture, from internal networks to external-facing systems.

Standard + additional app
6 days delivery
Application audit
Project plan
Web app pen test
from
£3300
Scoping form
For a free quote on testing

We'll be happy to prove a free quote, just complete our scoping form

Scoping form

Companies that work with us

Pen testing workflow

A streamlined pen testing service keeping you in the know.

Scope

Before the testing phase can begin, the scope of the pentest must be agreed upon by you. This includes identifying the target systems, networks, or applications to be tested, and the specific objectives and goals of the test. The scope should also outline any limitations, such as the type of attacks that are permitted or any sensitive data that must be protected. To make this easier we have our own Scoping Form to complete.

Test

The testing phase is where the actual pen testing takes place. We will attempt to exploit vulnerabilities in the target systems or applications using various techniques and tools. This may include network scanning, vulnerability scanning, password cracking, and social engineering. The goal is to identify as many vulnerabilities as possible and determine the potential impact of each one.

Report

Once the testing phase is complete, we will prepare a detailed report that outlines the vulnerabilities that were discovered, along with recommendations for remediation. The report will include an executive summary that highlights the most critical findings, as well as a technical section that provides detailed information on each vulnerability.

Wash Up Call

After the report has been delivered, we will typically hold a wash-up call with you to discuss the findings and answer any questions. This is also an opportunity for you to provide feedback on the testing process and the quality of the report.

Check Remediations

(No additional charge) Now is the time to review and prioritise the remediation recommendations in the report. We will also offer guidance on which vulnerabilities should be addressed first and provide additional support as needed. In some cases, we may retest the systems or applications at no additional charge to ensure that the remediations were successful.

Full Re-test

If a full retest is required, we may charge an additional fee depending on our agreement or the package you have chosen. This involves repeating the testing phase to ensure that all vulnerabilities have been addressed and that the systems or applications are now secure.

Renewal

We do recommend regular penetration testing, especially with the ever-changing threat landscape or any infrastructure changes.