Need Help?

Let's Get Started

Which type of pentest do you need? Hover over a title for more information.

You can also watch a brief video in the link at the bottom for an overview of each test type.

External infrastructure

External infrastructure is the Internet-facing assets that support your business. These are typically cloud-based (AWS, Azure) assets such as web servers, mail gateways, VPN gateways etc. During an external infrastructure test we will attempt to breach your business from the outside in, by exploiting weaknesses in this infrastructure.

Internal infrastructure

Internal infrastructure is the office network used internally in a typical business. These are usually Windows networks, where users log on to a laptop or workstation with domain credentials. During an internal infrastructure test, we will attempt to go from a position of no privilege on the network, to full domain or network control, using the same techniques as real-world attackers

Phishing

Phishing is the most common threat to your business today. Phishing simulation lets you test how prepared your staff are for a phishing attack. During a phishing simulation, we will craft phishing emails that are similar to those used in the real-world, and analyse your staff’s response to these emails.

Cloud assessment

The majority of tech-focused businesses host their assets in the Cloud. There are many advantages to Cloud, but how can you be certain your Cloud config is secure? A Cloud Assessment will check the hundreds of possible options available in your console to ensure the config is aligned with best security practice.

Mobile application

A native mobile application (which can be provided later as an Android APK or iOS IPA file) or a link to the relevant file in the App or Play store (if deployed already). [Example myapp, https://play.google.com/store/apps/details?id=com.spotify.music

Internal web application

API assessment

PCI segmentation

Web application

Your web application is one of your most prized assets, and by it’s nature one of the most exposed. A web app pentest is one of the best ways to make sure your app, your customers and your data is safe from Internet-based attackers.

Hover Over a Question To Get Help

We need some information to provide you with an accurate quote

You can see more information about external infrastructure in the video links on the bottom left

How many IPs will be live during testing?

The number of servers, computers or other network devices that will be live (online) and can be accessed remotely by our testing team.

Can we perform this test remotely?

We carry out the majority of our internal infrastructure tests remotely via a virtual device which you will deploy to your network. This is COVID-secure and is also cheaper for you, as it reduces the test duration and travel expenses.

What type of phishing assessment do you want?

Basic phishing sends specially crafted phishing email with links to blank websiites. Intermediate sends specially crafted phishing emails with links to specially crafted pages simulating a legitimate service. Spear-Phishing is a carefully crafted attack against a specific individual or email container malicious links or payloads and aims to get remote access to the targets machine or device.

What cloud provider are you using?

Which cloud service provider do you use? We will need to login to this provider to view the configuration and conduct our assessment.

Which platforms do you require us to carry ou...

Have you got, and do you require a test for Android, iOS or both?

Roughly how many user journeys does this mobi...

A user journey is set of processes that perform a specific task. The user journeys of your app define what it actually does for the user. For example, an airline application might have the following journeys: Search for flights, Book a ticket, Change a reservation, Check-in. Please provide the number of distinct user journeys your application provides.

How many user roles does this web application...

A user role is a group which users belong to and defines permissions for that user to perform or access a set of actions or tasks within the application. Examples of a user roles include Admin, Editor, Read-only and guest. Please note that guest is counted as a user role.

Roughly how many user journeys does this web ...

A user journey is set of processes that perform a specific task. The user journeys of your app define what it actually does for the user. For example, an airline application might have the following journeys: Search for flights, Book a ticket, Change a reservation, Check-in. Please provide the number of distinct user journeys your application provides.

How many user roles does this API have? Pleas...

A user role is a group which users belong to and defines permissions for that user to perform or access a set of actions or tasks within the API. Examples of a user roles include Admin, Editor, Read-only and guest. Please note that guest is counted as a user role.

Roughly how many functions does this API have...

A function is normally a method and path on an API that performs a specific task. The functions of your API define what it actually does for the user. For example, an airline API might have the following functions: List flights, Get a singular flight, Add a flight, Delete a flight, Search flights. This would be 5 functions. Please provide the number of distinct functions your API provides.

How many CDEs (Cardholder Data Environments) ...

A cardholder data environment (CDE) is a computer system or networked group of IT systems that processes, stores and/or transmits cardholder data or sensitive payment authentication data. A CDE also includes any component that directly connects to or supports this network.

Can we perform this test remotely?

We carry out the majority of our PCI Segmentation tests remotely via a virtual device which you will deploy to your network. This is COVID-secure and is also cheaper for you, as it reduces the test duration and travel expenses.

You're All Set!

Your quote is ready, just follow the instructions we will send to your email.

Next Generation IT Solutions Company

Are you ready for amazing I.T. support?

Enter your 9-digit code: