With our pen testing services, you can get an inside look at how attackers could exploit your vulnerabilities and receive guidance on how to prevent them.
Leading security-conscious companies across the world trust us.
All Packages Included
Dedicated Account Manager
Your dedicated experience manager will be involved from the initial point of contact through the project's conclusion.
Unlimited Vulnerability Scans
You will have unlimited access to over 75 vulnerability scanners and can perform unlimited scans.
Unlimited Integrations
Utilize our integrated remediation system or export the findings to your Jira instance, Slack, or database for further analysis and action.
Rescan Period
During the upcoming 12-month period, you are entitled to unlimited scans at no cost.
Vodania Platform Access
During the upcoming 12-month period, you are entitled to our Vodania Basic subscription on one additional target at no cost.
Detailed Reporting
Compliance reporting for SOC2, ISO 27001, PCI-DSS, HIPAA, NIST, and other regulations.
Preeminent Pentest Experts
Our cost-effective proposal is driven by value, capitalizing on the expertise of professionals with experience in leading companies.
Scan Attestation
The results of five expert-attested scans guarantee the absence of false positives.
City of Hats Access
Cybersecurity professionals are available to address and remedy vulnerabilities through our exclusive freelancing platform.
Vodania Verified Pentest Certificate
Obtain our publicly recognized certificate of authenticity.
Dedicated Slack Channel
A dedicated Slack or Microsoft Teams channel will be available to improve communication throughout the project.
What is the procedure followed by Vodania for conducting penetration tests?
Whether you are contemplating engaging Vodania for a penetration test or have already executed a contract with us for such a service, the value of transparency is evident. Comprehensive information facilitates informed decision-making and aids in optimizing the planning process, a principle we wholeheartedly concur with. Acknowledging the intricate nature of cybersecurity, we are committed to assisting you in identifying operational efficiencies.
We have developed a detailed project timeline covering every aspect of our penetration test service to provide a clear understanding. This narrative is designed to outline, in a structured way, the entire sequence of steps involved in an engagement with Vodania, from start to finish.
The intended outcome is an elucidation of our meticulous process and an informed understanding of the expected experience in all its phases.
The 4 Phases of a Vodania Penetration Test Project
1. Kickoff Call and Final Preparations
Initiate the necessary configuration on your end to permit access to our team's public IP addresses through any instituted technical controls that can hinder the testing process, such as a web application firewall.
If authentication credentials are indispensable for this evaluation, we must onboard our designated test accounts. (The pen test authorization correspondence will furnish relevant email addresses.)
Simultaneously, you must notify your security and network teams of the impending pen test. This collaborative effort should remain transparent. Our external IP addresses will be shared to facilitate prompt correlation of aberrant activities.
Depending on the specific aspects of the testing procedures, certain details may require confidentiality, especially in the context of social engineering campaigns. However, even in these cases, it's crucial to disseminate information among internal IT and C-level executives. Rest assured, we will take all necessary precautions to ensure that targeted employees are not privy to these details, reinforcing our commitment to maintaining the highest level of security and trust.
2. Testing
At this juncture, you are poised to commence the testing phase. On the inaugural day, a notification will be disseminated to indicate the initiation of testing.
Subsequently, status updates will be communicated via MS Teams or Slack as progress is made. These updates will comprehensively encompass all discerned findings, accompanied by pertinent screenshots and detailed steps for reproduction.
In the event of any minor issues or queries, rest assured that communication will be promptly extended. High-risk findings will be expedited for review within 24 hours of verification, demonstrating our commitment to a swift and effective resolution process.
Upon completion of the testing phase, the pen test report will be meticulously drafted, necessitating a whole week post-test completion to accommodate thorough report composition and our internal review process involving multiple team members.
3. Presentation of Findings.
The report will be distributed via MS Teams or Slack upon the review's conclusion.
At CyberSSS, we are committed to a transparency policy that ensures no surprises. After publishing the final status update, you can be assured that all identified findings will be integrated into the comprehensive report. Furthermore, the report will furnish in-depth insights into our testing methodology and a detailed narration of the attack path, cultivating your comprehensive awareness and active engagement in the process.
4. Rescan
Upon review of the report, there is a 12-month window available to retest all initially identified findings at your discretion. In case of a retest, we request that all issues be remediated before requesting the retest. Upon completion of this process, a retest report will be generated.
FAQ
A penetration test involves emulating cyber attacks on your systems to reveal potential vulnerabilities. Regularly scrutinizing your IT systems and assets is imperative to shield your company from unauthorized access. Adopting an adversarial perspective facilitates the detection of concealed backdoors and weaknesses.
Penetration testers, also known as security experts and ethical hackers, possess substantial knowledge of IT systems and a track record of identifying vulnerabilities. Esteemed testers strictly adhere to ethical guidelines. Throughout the testing phase, they employ non-destructive procedures to ensure your data and system's confidentiality, integrity, and availability. Upon completion, they eradicate any back doors and address other process vulnerabilities.
External penetration testing is significant as it mitigates the risk of undetected blind spots. Despite the diligent efforts exerted by your security and IT teams to safeguard your infrastructure, oversights may occur. A supplementary perspective proves invaluable in detecting particularly elusive vulnerabilities.
A vulnerability assessment involves utilizing a vulnerability scanner to identify weaknesses in systems' security or performance. In contrast, penetration testing is predominantly conducted manually, leading to higher costs. Additionally, penetration testing aims to reveal and attempt to exploit vulnerabilities.
Upon receipt of all findings, initiating remedial action to address identified vulnerabilities promptly is imperative. Subsequently, a reevaluation of the target will be conducted to verify the correct remediation of vulnerabilities. This process ensures that remediation efforts are effectively underway and all vulnerabilities mitigated. Notably, Vodania offers a complimentary full year of rescans at no cost.
Vodania is pleased to support the following applications: Email, SMS, Slack, Microsoft Teams, Facebook, Messenger, LinkedIn, Twitter, Line, WhatsApp, Telegram, Skype, Discord, Instagram, TikTok, Viber, Snapchat, Signal, Reddit, Kik, WeChat, and BBM.
We take great pride in the operation of our City of Hats sub-freelancing platform and the exceptional quality of our hats. Each applicant undergoes a rigorous review process, during which we meticulously authenticate their identity, payment details, certification, phone number, email address, and three references. Furthermore, we conducted a thorough phone interview to validate all the information provided. Additionally, all applicants are subjected to an annual background check. Should you observe any suspicious activity or wish to report an issue, please do not hesitate to contact us, and we will promptly initiate an investigation.