Protection of personal data, user passwords, payment information and other data is the responsibility of the business.
This procedure should be conducted on a regular basis until there is a problem. But if there is any trouble, it is definitely not possible to postpone.
A danger of hacking
- Hackers can access your data such as documents, source codes, databases;
- Users' personal data, logins, passwords, bank card numbers may be in danger;
- A temporary or permanent shutdown of the website, which leads to loss and causes users' dissatisfaction;
- Information or code substitution on the website - from third party announcements to substitution of information about a payment gateway;
- Complete website and data deletion beyond recovery.
How is the audit carried out?
We conduct the authorized attack on your website with the same tools that the hackers use in their work.
A white box method
We analyze the source code of your website and look for vulnerabilities based on our experience of web development.
A black box method
We act like hackers do and try to hack your website in every possible way, without access to the source codes.
Audit result
After the work has been done, you receive a full report on the vulnerabilities found, their level of danger and ways to eliminate them. You can address identified vulnerabilities on your own or entrust it to us.
Where to start?
We analyze the website, use scenarios, draw up a work plan and determine the cost of work.
Prices and timing
We have identified an approximate price range for your comfort. However, the important thing to remember is that the price of each solution is culculated on the individual basis.
Level |
Black box
Most customers choose this method
|
White box
Testing with source code analysis
|
---|---|---|
Price |
800 $
The cost may vary depending on the complexity of the system being tested
|
from 2000 $
The cost is determined after preliminary system analysis
|
Vulnerability scanning | ✓ | ✓ |
Recommendations for addressing | ✓ | ✓ |
Source code analysis | ✓ | |
Addressing vulnerabilities | On the individual basis | On the individual basis |
Development time | 1-2 weeks | from 3 weeks |
Order
|
Order
|