Is your network secure?
Penetration testing is the best way to know if your network, servers, and applications are secure. When you contract Zanarkand for a pentest, we will work with you to determine the scope and rules of engagement, as well as intended start and end dates. Once we have completed the test, we will deliver a full, detailed report on our findings and methodology. We will also include recommendations on how to fix any issues we find. Check out more information below, and then contact us for a free consultation.
CERTIFIED PENTESTERS
There are a number of certifications available for pentesters, but the OSCP certification stands above them all as a rigorous and thorough vetting of a pentester’s ability. All of Zanarkand’s pentesters are required to at least have their OSCP certifcation before they can do any work for a customer, and are encouraged to obtain more certifications as their experience grows.
TARGETED TESTS
As part of the pentesting process, we will work with you to determine the systems that need to be tested, as well as the methods employed. Whether you are looking for a black box pentest of your entire network or a white box test of your development servers, we can accommodate it.
UP FRONT PRICING
Pentesting engagements can vary greatly in scope and depend heavily upon the amount of information supplied up front as well as the amount of information and attack vectors requested. The pricing below is supplied to give a point of reference only and all quotes are custom designed to meet the needs of our customers.
PENTESTING LINGO
Though times are changing, and the public is becoming more educated in cyber-security, much of its language and terminology is obtuse or inaccessible. Because we want to have more informed, open conversations with the community, we’ve provided a small list of terms below to help clarify what we do.
Term | Definition |
---|---|
Pentest | A test of a system’s security through exploits, social engineering, and hacking. |
Exploit | A vulnerability in a program, protocol, or system that allows access, information, or control. |
White Box | A pentest where the pentester has full knowledge of the network and targets ahead of time. |
Grey Box | A pentest where the pentester has limited knowledge of the network and targets. |
Black Box | A pentest where the pentester has no knowledge of the network and targets. |
Social Engineering | The pentester attempts to gain information and access through psychological techniques. |
Pricing
Full Report with All Findings
Completed by OSCP-Certified Pentester
Full Report with All Findings
Completed by OSCP-Certified Pentester
Full Report with All Findings
Completed by OSCP- and OSWP-Certified Pentester
Full Report with All Findings
Completed by OSCP-Certified Pentester
Includes On-Site Visits, if Requested