• Subscribe to the low volume list for updates.

External Vulnerability Assessment

PROFESSIONAL SERVICES

Fixed Price No Fuss Security Reviews
Understand your security posture and give attackers a hard time.

Vulnerability scanner matrix
Expert Advice
Independent assessment from a Senior Security Analyst. No BS.
Streamlined Process
Focused on the things that matter. Clear and Accurate Results.
Know Your Exposure
Get a clear snapshot of your vulnerability exposure.
Book your assessment window today. Due to high demand there are limited windows available in the next 3 weeks.

Single ReviewFrom $2000USD
  • Validated Security Findings
  • Fixed price assessment
  • Fast turn around (72 hrs)
  • Clear results with recommended fixes

20% discount
Quarterly ReviewFrom $6400USD
  • Security Review performed Quarterly
  • Hassle Free Regular Assessments
  • Monitor Ongoing System Changes
  • Clear results with recommended fixes

Some Common Questions

What are the typical targets of this assessment service?
We are able to provide vulnerability assessments of web applications, Internet connected servers and Internet connected network ranges. Multiple targets can be included in one assessment, however as the range of targets expands the level of granularity will be reduced in the fixed price offering. If you need a large number of Internet endpoints assessed custom options are available.

In addition we have a focused WordPress Security Assessment and an Attack Surface Assessment using open source intelligence that can be conducted with no impact on the target network / systems.

Who uses these Security Assessment Services?
Our professional assessment services are popular with anyone who wants an independent third party review of their security posture. Clients are based around the world and vary from small business to large enterprises.
Can I get an assessment against client systems?
Of course! Agencies and consultants can use this service to perform security reviews of sites they are handing over or working on. A value added service for your web projects or managed services.
What are the testing methods used?
Using a combination of manual security testing and automated testing tools the site, network and / or system will be checked for vulnerabilities. Results from the automated tools are assessed and validated using manual testing methods and other tools. An easy to follow security report is then compiled to provide an overview of the findings in an understandable format.
Who performs the security assessment?
All security assessments are performed by a Certified Senior Security Analyst. Industry standard qualifications include GIAC (Global Information Assurance Certification) from the Sans Institute.
What if my budget is limited?
If you cannot afford the cost of a manual assessment you may like to try our automated DIY services. We have hosted open source vulnerability scanners that can be run manually by members of your team. This involves planning your testing, receiving the raw results from our scanning tools, analysis and validation of those results.
Why is this service so cheap?
By offering a focused tactical security assessment service, we have streamlined the process and eliminated scope creep. Not everyone needs an assessment that takes weeks and costs tens of thousands of dollars. By having a fixed length testing window, the aim is to get an actionable understanding of the security posture of a system, network or web application.

Rest assured that our focus does not impact our availability to answer your questions before, during and after the assessment.

What does the report include?
The report is compiled after analysis of the results from the automated and manual testing. Sections include an overall summary of the vulnerabilities found, a detailed list of discovered vulnerabilities including recommended fixes and an appendix that contains the raw results from the tools that were used during the assessment.

How does the payment system work?
Payment is via Credit Card or PayPal, Hacker Target Pty Ltd is a Paypal verified business. Once we receive your initial booking we will provide a copy of the terms of the assessment and payment details. Following confirmation of payment, we are ready and will proceed with the assessment at your allotted time. Reports are available within 72 hours.
Organizations that do not scan for vulnerabilities and address discovered flaws pro-actively face a significant likelihood of having their computer systems compromised.

Get Started Here

Complete this form to request a Security Assessment of your Internet facing system, network or web site. We will get back to you within 24 hours with a proposed plan, terms of the service and payment details.

If there are particular systems or applications you would like the assessment to focus on then please detail these requirements. In this case a high level security assessment will be conducted against the target, with focused testing performed against the system or application of particular interest.

With this fixed rate security assessment testing is conducted in a 24 hour window, with report delivered within 72 hours.

Client Requirements:

  • You must be the owner of the system or have explicit permission to have a third party security assessment performed against the target system.
  • If the system is a managed service or shared web hosting you must notify and have permission from the provider of the managed service.
  • A working backup of the target system is strongly recommended. Security testing is inherently intrusive and while the chance of anything bad happening is very low, there is always the chance that a system could be adversely impacted by the testing.

Deliverables:

  • Detailed Security Report delivered within 72 hours.
  • Report to contain validated results and recommended remediation.
  • Follow up questions to be conducted via email.
  • Vulnerability Assessment Request: