penTEST as a Service
and Cyber Risk Assessments

We are #looking4trouble so that you don't have to...

Pentest Team

Penetration Services

What you get from our pentest and assurance services

We will scope and test your assets to identify cybersecurity vulnerabilities. You will get a detailed report with identified risks and recommendations on how to fix them. At every step, you will be assisted by our experienced pentesters.

Application Penetration Testing

Most wanted: Our team simulates attacks on your website, web or mobile applications to assess security risks using standard NIST, OWASP methodologies.

Network Penetration Testing

Quite important: We test networks and services for weaknesses using attacker tools and manual techniques to highlight your external and internal exposure risks.

Security Assessments

For regulars: We use professional tools and advanced techniques to discover vulnerabilities in your cloud or on premise infrastructure, services or devices.

Source Code Review

For the advanced: We review your source code to identify security vulnerabilities and weaknesses. We also provide recommendations on how to fix them.

Web Application Firewall (WAF) Testing and Management

For the elite: Web Application Firewalls (WAF) are a critical component of your security infrastructure. We test and manage your WAF to ensure it is properly configured and protecting your applications.

Incident Response

For the unfortunate: We help you respond to security incidents, e.g. data breaches, malware infections, ransomware attacks, DDoS. We will also help you improve your cyber maturity and resilience.

approach

Methodology and outcomes...

penTEST – Penetration Testing Services

We are #Looking4Trouble to identify risks before they turn into incidents with catastrophic business impacts.

Penetration testing also called pen-testing or ethical hacking is the practice of testing system, networks, services and web applications to find security vulnerabilities that an attacker could exploit. We find cybersecurity risks and provide proven mitigation strategies.

Targeted approach

We use threat informed and risk-based approach to uncover your most critical risks and “low-hanging fruits” targeted by attackers, giving you more "bang for buck" and coverage.

Affordable Service

Our costs are designed to provide any business access to a suite of cybersecurity services with cost-effectiveness top of mind and a common-sense approach - "if there is a will, we will find a way".

Expert team

Our team of vetted certified security consultants is actively engaged with leading Managed Security Service Providers, protecting, detecting, responding and adapting against the ever-growing cybersecurity attacks.

Engagement timeline

Step 1: Scoping

Scoping the test is the first step. We will work with you to understand your business and technical requirements and identify the scope of the test. We will also agree on the rules of engagement and the testing methodology.

Step 2: Assessment

We will perform the assessment using a combination of automated tools and manual techniques. We will also use our experience and creativity to identify vulnerabilities that automated tools cannot find. We will also attempt to exploit the vulnerabilities to demonstrate the impact of the vulnerability.

Step 3: Reporting

We will provide a detailed report with identified risks and recommendations on how to fix them. We will also provide a high-level executive summary for management. We will also provide a debriefing session to discuss the findings and recommendations.

Step 4: Re-Testing

We will re-test the vulnerabilities that were fixed to ensure they are no longer exploitable. We will also provide a re-test report to demonstrate that the vulnerabilities have been fixed.

Celebrate and schedule the next round!

Pentest Maturity Journey

CyberSecurity News

View all posts »

News on cybersecurity, risks, penetration testing tips and tricks. Learn about services, improving cybersecurity posture and stay secure online.

2021 CWE Top 25 Most Dangerous Software Weaknesses

2021 CWE Top 25 Most Dangerous Software Weaknesses

The 2021 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses (CWE Top 25) is a demonstrative list of the most common and impactful issues experienced over the previous two calendar years.

Health apps vulnerable to hacking through APIs

Health apps vulnerable to hacking through APIs

New research showing third-party apps integrating with electronic health record (EHR) systems are vulnerable to hacking comes as no surprise to a New Zealand cybersecurity specialist who says the local situation is likely “even worse”.

FAQs

Frequently Asked Questions

Here are some of the most common questions we get asked.

What is penetration testing?

Penetration testing, also known as ethical hacking, is a security assessment technique performed on computer systems, networks, or applications to identify vulnerabilities that could be exploited by malicious attackers. It involves simulating real-world attack scenarios to uncover weaknesses and provide recommendations to improve overall security.

Why is security assurance important?

Security assurance and pen-testing is crucial for organizations to proactively identify and address security vulnerabilities. By conducting such tests, organizations can evaluate the effectiveness of their security measures, identify potential weaknesses before attackers exploit them, and take appropriate measures to strengthen their defenses. It helps in enhancing overall security posture and reducing the risk of cyber attacks.

What's something that you don't do?

Anything illegal, unethical or not in scope of our service. Please do not ask if we can hack your Facebook, Insta or whatever personal account. We only engage in activities that are legal and ethical.

What's the difference between a black-box and a gray-box?

Black-box is testing with no prior knowledge of the application and is usually related to unauthenticated access. Gray-box testing is when we have some knowledge of the application, e.g. we have test accounts, documentation. Gray-box includes black-box testing. Check out our blog for more information on types of tests, tips and tricks

What do I need to start?

You need to have an asset or environment that you want to test, e.g. a web app, web service, external network, Microsoft 365 environment. You may also need approval from service providers hosting your targets, etc. During the scoping phase, we will work with you to identify all requirements.

How long does it take?

Some engagement take 1 day, some up to 2-3 weeks. It depends on the overall scope, your priorities, availability of resources, etc. We will provide a detailed timeline as part of the proposal. Also the frequency of testing depends on various factors such as the industry, information sensitivity, regulatory requirements, and the rate of system changes.

Philosophy: Client-focused, Quality and Cost Effective

About us

We provide affordable penetration testing services for all businesses. We are a trusted team of experienced security researchers and certified penetration testers with a passion for cybersecurity. Based in New Zealand and Australia with resources across the world from EU to US, we got you covered.

  • 1

    Experienced Team

    We are a purple team of vetted certified security consultants, actively engaged with leading Managed Security Service Providers, protecting customers and building resilience against the ever-growing cybersecurity attacks.

  • 2

    Affordable Service

    Our service costs are designed to provide any business access to a suite of cybersecurity services with cost-effectiveness top of mind and a common-sense threat informed and risk-based approach.

  • 3

    Targeted approach

    We use threat informed and risk-based approach to uncover your most critical risks and “low-hanging fruits” targeted by attackers, giving you more bang for buck.

Affordable penetration testing for smart businesses

Don't wait to get hacked. Ask now how you can improve your cyber resilience