How to get a pentest quote?
We customize our penetration testing offers to match your specific needs and requirements. The time and cost involved largely depend on the attack vectors to be assessed and the complexity of the systems or applications in scope. Although we use a range of tools during our assessments, manual work remains the primary component. Therefore, it is crucial to clearly define what exactly you would like tested. The more detailed information you provide upfront, the more precisely we can tailor the pentest offer to your requirements.
In general, we recommend a gray box approach — meaning you would provide us with information that saves us time when carring out the pentest. This significantly increases the efficiency of the pentest. To prepare a tailored pentest offer, the following information would be helpful depending on the scope and target:
- Offer external pentest - For an external penetration test (attack vector via the internet): Please provide your public IP addresses, IP address ranges, and domains. This information is public by nature. We would then conduct a non-invasive preliminary port scan to identify available services.
- Offer internal pentest - For an internal penetration test (attack vector via on-site access or a jump host): Details about the number of employees, IT workstations, and servers would help us estimate the appropriate time effort for the pentest.
- Offer web application pentest - For a penetration test of self-developed software or applications: A description of the application, and ideally demo credentials or a live demonstration, would be very helpful. Understanding the complexity of the application (e.g., number of forms, user roles, download/upload features) is essential to creating a tailored pentest offer.
Offer Pentest - Interested in a Quotation Penetration Test? Just contact us!
Our service in a nutshell:
Conducting Penetration Testing (Pentest)
Since 2013 our certified penetration tester team conduct pentest for IT infrastructures, web applications and mobile APPs (iOS / Android) and using a structured approach based on all relevant publications. As a service provider evaluate the identified and exploited vulnerabilities based on the associated business risk and compiling it into a report that contains a summary for the IT management and the technical details of the vulnerabilities identified. After you fix the vulnerabilities, we usually perform a retest without any additional charge.
Contact us
Our service in a nutshell:
Conducting Penetration Testing (Pentest)
Since 2013 our certified penetration tester team conduct pentest for IT infrastructures, web applications and mobile APPs (iOS / Android) and using a structured approach based on all relevant publications. As a service provider evaluate the identified and exploited vulnerabilities based on the associated business risk and compiling it into a report that contains a summary for the IT management and the technical details of the vulnerabilities identified. After you fix the vulnerabilities, we usually perform a retest without any additional charge.
Contact usPentest-Methodology
Pentest use the same tools and techniques that real attackers would use to break into a system. It includes the use of security tools and carrying out manual tests to uncover vulnerabilities. Thus is it not a automatic vulnerability assessment. On the contrary, as a service provider for penetration testing we are using the same tools and techniques that real attackers would use to break into a system. But while a real attacker only needs to find and exploit one vulnerability, a penetration tester checks all relevant attack vectors.
Having a structured approach is one of the most important factors to achive this in order to provide a professional pentesting service. Our approach is based on all relevant standards and publications.
Getting an Offer for a pentest
Pentest are always a compromise between effort and cost, to get a reasonable price. Successful pentest offer a good balance between these criteria to facilitate the testing of all relevant attacks and attack vectors. The cost of such a test always depends on the time the penetration tester spends and on the extent and complexity of the IT system or web applications. While a penetration test for a small application takes only some days, it can take several weeks for a large network or complex application.
For a pentest offers we do require prior information about the systems and applications that are to be examined. It is important that we get an initial impression of the target. For web applications, for example, test access can be helpful. Any additional information, e.g. the framework etc., can make it easier for us to draft a suitable offer for you. If you need us to pentest an IT system, we will need the corresponding network addresses in advance. In this particular case, we will first perform a non-invasive network scan to get a first look at your network. We will provide a detailed offer once we can estimate the effort required.
binsec GmbH is your german security service provider for penetration testing. Please get in touch with us if you would like to get a formal quote or if you have any questions. The company binsec GmbH is your pentesting vendor - get your pentest today!
Contact us
Pentesting
for specific standards and requirements
There are a lot of standards or legal requirements worldwide, that require conducting of a penetration test.
binsec GmbH for professional Penetration Testing Your pentest experts!
binsec GmbH is the company for professional penetration testing. Get a pentest offer without typical sales nonsense. Talk to experts instead to pre sales consultants. Better pentesting. No nonsense. As a company for professional penetration testing, we do some things differently than other pentest provider: As a penetration test firm, we do not sell vulnerability scans as pentest. We do also focus on business security risks. You are looking for a professionally conducted penetration tests? Get the binsec team for your pentest!
Contact us
Frequently Asked Questions
It is difficult to give an generalized answer to this question, since the toolset used basically depends on the respective test object. Of course, we use tools such as nmap to check IT infrastructures or the Burp Suite Professional in the case of web applications.
However, we believe that publishing a tool list is mere window dressing, as each target system should be tested individually. However, you are welcome to ask us about the tools we used after the pentest.