External Vulnerability Assessment
Know Your Network. Fixed Price. No Fuss Security Reviews.
Understand your security posture and give attackers a hard time.
Expert Advice
Independent assessment from a Senior Security Analyst. No BS.
Streamlined Process
Focused on the things that matter. Clear and Accurate Results.
Know Your Exposure
Get a clear snapshot of your external vulnerabilities. Know what an attacker can see.
Get a Quote
- Validated Security Findings
- Fixed Price Security Assessment
- Fast turn around available (72 hrs)
- Clear results with recommended fixes
- Custom Options Available
- Security Review performed Quarterly
- Hassle Free Regular Assessments
- Monitor Ongoing System Changes
- Clear results with recommended fixes
- Custom Options Available
Some Common Questions
We are able to provide vulnerability assessments of web applications, Internet connected servers and Internet connected network ranges. Multiple targets can be included in one assessment, however as the range of targets expands the level of granularity will be reduced in the fixed price offering. If you need a large number of Internet endpoints assessed custom options are available.
In addition we have a focused WordPress Security Assessment and an Attack Surface Assessment using open source intelligence that can be conducted with no impact on the target network / systems.
Our professional assessment services are popular with anyone who wants an independent third party review of their security posture. Clients are based around the world and vary from small business to large enterprises.
Of course! Agencies and consultants can use this service to perform security reviews of sites they are handing over or working on. A value added service for your web projects or managed services.
Using a combination of manual security testing and automated testing tools the site, network and / or system will be checked for vulnerabilities. Results from the automated tools are assessed and validated using manual testing methods and other tools. An easy to follow security report is then compiled to provide an overview of the findings in an understandable format.
All security assessments are performed by a Certified Senior Security Analyst. Industry standard qualifications include GIAC (Global Information Assurance Certification) from the Sans Institute.
If you cannot afford the cost of a manual assessment you may like to try our automated DIY services. We have hosted open source vulnerability scanners that can be run manually by members of your team. This involves planning your testing, receiving the raw results from our scanning tools, analysis and validation of those results.
By offering a focused tactical security assessment service, we have streamlined the process and eliminated scope creep. Not everyone needs an assessment that takes weeks and costs tens of thousands of dollars. By having a fixed length testing window, the aim is to get an actionable understanding of the security posture of a system, network or web application.
Rest assured that our focus does not impact our availability to answer your questions before, during and after the assessment.
The report is compiled after analysis of the results from the automated and manual testing. Sections include an overall summary of the vulnerabilities found, a detailed list of discovered vulnerabilities including recommended fixes and an appendix that contains the raw results from the tools that were used during the assessment.
Payment is via Credit Card or PayPal, Hacker Target Pty Ltd is a Paypal verified business. Once we receive your initial booking we will provide a copy of the terms of the assessment and payment details. Following confirmation of payment, we are ready and will proceed with the assessment at your allotted time. Reports are available within 72 hours.
Get Started Here
Complete this form to request a Security Assessment of your Internet facing system, network or web site. We will get back to you within 24 hours with a proposed plan, terms of the service and payment details.
If there are particular systems or applications you would like the assessment to focus on then please detail these requirements. In this case a high level security assessment will be conducted against the target, with focused testing performed against the system or application of particular interest.
With this fixed rate security assessment testing is conducted in a 24 hour window, with report delivered within 72 hours.
External Vulnerability Assessment
Client Requirements:
- You must be the owner of the system or have explicit permission to have a third party security assessment performed against the target organisation.
- If the system is a managed service or shared web hosting you must notify and have permission from the provider of the managed service.
- A working backup of the target system is strongly recommended. Security testing is inherently intrusive and while the chance of anything bad happening is very low, there is always the chance that a system could be adversely impacted by the testing.
Deliverables:
- Detailed Security Report delivered within 72 hours.
- Report to contain discovered results and recommended remediation.
- Follow up questions to be conducted via email.