Request a quote

Penetration Testing

Please only answer the questions related to the service you are interested in.

External Network Penetration Test

Number of IP addresses?

(This will send your answers for all categories)

Internal Network Penetration Test

Number of IP addresses? (List the IPs as per the internal assets)

Can the testing be conducted remotely?

(This will send your answers for all categories)

Web Application Penetration Test

Please provide the following information for each application that you would like tested.

Is the Web Application internal or hosted over internet or within a Cloud Service Provider? If cloud please list vendor.

If this Web Application is hosted on an internal network, can the testing be conducted remotely?

If this Web Application is hosted over internet, please provide the URL?

How many unique dynamic pages (pages that change based on user inputs)?

Will credentials be for authentication be provided?

How many user roles would you like tested?

(This will send your answers for all categories)

API Penetration Test

How many API endpoints?

Is there any sample collection of the API endpoints?

If yes, you need to share it over the email or attach the collection file over here.

(This will send your answers for all categories)

Mobile Application Penetration Test

What is the name of the application?

Please describe the purpose the application.

What platforms would you like tested for this application? (e.g. iOS, Android, Windows)

How many server side calls are associated with the mobile application? (if applicable)

Is the application available in Play/App Store?

If yes, please provide their respective links.

If no, please share the executable files over an email or attach it over here.

(This will send your answers for all categories)

Wireless Penetration Test

How many locations?

How many SSIDs are at each location?

(This will send your answers for all categories)

Configuration Review (Network/Cloud)

How many network devices in scope of configuration review?

(This will send your answers for all categories)

Architecture Review

Is architecture security review for network diagram in scope?

If yes, please share the architecture diagram over the email or attach it over here.

(This will send your answers for all categories)

Social Engineering: Phishing

How many employees to be part of the assessment?

Are you looking for employee awareness and perimeter security assessment from social engineering and phishing attack perspective?

(This will send your answers for all categories)

Code Review

What is the purpose the application?

What language(s) is/are used for the application?

How many lines of code?

(This will send your answers for all categories)

Red Team Assessment

Testbytes provides time bound (5 or 10 days) no scope, external red team assessment where OSINT and manual hacking techniques are used to bypass blue team detection and compromise weaknesses. The goal is to show maximum impact using real world hacking techniques.

Please specify number of man-days if you require this service (5 or 10 man-days)?

(This will send your answers for all categories)

Other Services

If there are any other services you are seeking from Testbytes, please share it.

(This will send your answers for all categories)