Penetration tests are for organizations that want to check whether there is a weak point in their IT security that hackers could use to carry out an attack. Testing is done by simulating a hacker attack, using the same techniques and tools.
Test the security of the application, mobile application or API. We perform security audits of more than 90 security areas according to the OWASP methodology.
Show more →
Test the security of your perimeter from the public network, verify the correct configuration of your internal network or verify your cloud provider.
Show more →
Our social engineering service will help you shed light on and document potential weaknesses among your employees.
Show more →
During penetration testing, a combination of manual and automated testing occurs, depending on the nature of the systems and applications being tested.
If the tests are performed in a production environment, the level of automated testing and interference with the production system can be minimized so as not to cause unnecessary damage.
Testing is conducted in accordance with OWASP and OSSTM.
During the tests we mostly use the Kali linux distribution and its tools Nmap, Nikto, MetaSploit, DirBuster, Nessus, Hydra, OWASP ZAP, Burp Suite, John the Ripper and many others.
We look for known vulnerabilities in the platform under test and write and modify scripts to exploit them.
Each penetration test is followed by an evaluation phase that describes the test process, a description of any vulnerabilities found, and a rating of their severity according to the CVSS classification.
This is the part of the report that is aimed at security managers, engineers and application developers, where each vulnerability is also accompanied by a recommendation on how to prevent or resolve the issue.
It includes:
At the end of the report, you will find a management summary that explains in a clear way to the management of the company the vulnerabilities and security gaps found, their severity and ways to fix any problems.
It includes:
The average price of penetration tests ranges from EUR 2,000 to EUR 12,000. The price is equivalent to the scope and complexity of the project.
What factors influence the cost of testing?
01.
The scope of testing is directly proportional to the number of assets and their complexity (IP addresses, applications, databases, devices, APIs, etc.).
02.
The price of penetration testing also varies depending on the methodology and complexity of the test. The methodologies used have different areas of focus, which consist of sets of tests. Adding or removing specific tests again affects the cost of penetration testing.
03.
Penetration testing of web applications and most other tests can be performed off-site. However, there are cases where large and complex environments are tested. At this point, an on-site visit to the customer’s site may be necessary. Onsite tests are also required for physical security penetration testing.
04.
You will incur additional costs if you require assistance with remediation and/or require re-testing after repairs have been carried out.
We will be happy to discuss your situation with you and prepare a non-binding offer.
We can also send you a sample of our work – a sample test report.
You can also find us at our offices in Prague, Brno or Bratislava
We have prepared an online vulnerability test that can identify some of the vulnerabilities in your systems. Your specialists can then test the quality of their security themselves, free of charge.
U Sluncové 666/12a
186 00, Praha 8
Czech republic
Sales Department
sales@integra.cz
+420 214 214 602