APTA

Penetration Testing

When is the right time to do a penetration test?

It is probably the right time if

You have not had a penetration test in the past, or your last penetration test was more than 12 months ago

Your insurances require a penetration test

You have compliance or audit requirements that mandate a security assesment

Vulnerabilities have been identified as an issue and require validation / action

Unauthorised access to perimeter services, users or application is suspected

Best practice security benchmarking of deployment practices / implementation is needed

You need assurance that systems have been deployed securely and your IT team are operating effectively.

Services We Offer

Penetration Testing (Pentest) is where we perform an assessment of an organisation’s security, from the position of a malicious attacker using the same tools and techniques as real threat actors in the wild. This includes an assessment of your risks, threats, vulnerabilities, and overall security posture, in a safe and structured manner.
White Box

Also known as an internal assessment, Penetration Testers are given full access to the source code, application specifics or internal network access and information, to ensure a complete assessment of the vulnerabilities from an informed source.

Grey Box
Penetration Testers perform an assessment with some information or access provided by the organisation, such as IP addresses or user credentials to focus efforts on high-risk areas.
Black Box
Penetration Testers perform an assessment of the organisation with no information except the company name, to investigate and target vulnerabilities exploitable from outside of the network.
Scoping /Quotation Questionnaire

    Company Information & Contacts

    Please provide the contact details of the Primary person for the quotation.

    [cf7mls_step cf7mls_step-1 "Next" ""]

    Perimeter Assessment / Cloud Services / Internet Facing Services

    Complete this section if your engagement encompasses an assessment of your internet facing services (perimeter services)

    Please provide the total number of targets for the perimeter testing or the IP Address(s) for the Internet facing services you wish to have assessed. Such as 203.54.113.0/24, 210.23.154.10, application.domain.tld. Alternatively, a file containing the targets can be uploaded to our Sharefile/SharePoint services. Please contact enquiry@accreditedpentestingaustralia.com.au if you require access to our File Sharing platform.

    Are there specific time window/s that penetration testing activity must be restricted to?

    E.g. All can be tested any time or the host 210.215.67.89 only after 5 PM and before 9 AM.

    Note: After hours testing requirements will attract an after-hours rate.

    If we successfully breach the perimeter or cloud services or compromise an account would you like us to perform a breach simulation to see how far we can go and what we can get access to?

    Often the weakest link in most organisations is the end-users. As a result, we would recommend that you consider a phishing campaign(s) to gauge the level of risk from the end-users.  Our options can be found below.

    [cf7mls_step cf7mls_step-2 "Back" "Next" "Step 2"]

    Internal Testing

    Complete this section if your engagement encompasses an internal assessment or "Jack-In" Assessment.

    Please provide the total number of targets for the perimeter testing or the IP Address(s) for the Internet facing services you wish to have assessed. Such as 203.54.113.0/24, 210.23.154.10, application.domain.tld. Alternatively, a file containing the targets can be uploaded to our Sharefile/SharePoint services. Please contact enquiry@accreditedpentestingaustralia.com.au if you require access to our File Sharing platform.

    Are there specific time window/s that penetration testing activity must be restricted to?

    E.g. All can be tested any time or the host 210.215.67.89 only after 5 PM and before 9 AM, all targets after business hours etc.

    Note: After hours testing requirements will attract an after-hours rate.

    [cf7mls_step cf7mls_step-3 "Back" "Next" "Step 3"]

    Wireless Assessment

    Complete this section if your engagement requires a Wireless Assessment.

    Please provide the number of SSID(s) we are to assess.

    As part of our wireless assessments we will either send a NUC device to site, or complete this component on premise. Please advise if we should:

    Are there specific time window/s that penetration testing activity must be restricted to?

    E.g. All can be tested any time or the SSID bla, only after 5 PM and before 9 AM.

    Note: After hours testing requirements will attract an after-hours rate.

    [cf7mls_step cf7mls_step-4 "Back" "Next" "Step 4"]

    Web Application Assessment

    If your engagement includes a Web application assessment, please provide the following details on the web application(s) to be assessed.

    • Please provide the URL we are to assess (if available)

    • Please confirm Whether this is a Staging or Live Application

    • Please advise any testing constraints we need to be aware of, or restrictions such as specific time windows for testing.

    • Please confirm the number of accounts we are testing the application with or is this an unauthenticated assessment (without credentials).

    • Rough number of pages/endpoints for the app. (or advise if we can be provided access to determine the details ourselves.)

    Example: URL: https://mywebapplication.com (Live URL), Authenticated assessment using 2 accounts (1 x guest, 1 x admin), test after 5PM and before 9AM. ~50 pages/endpoints, 4 forms

    Example2: URL: https://stagingwebapplication.com (Staging Environment), No time limit on testing, Anonymous testing only (Unauthenticated) only - Single Login Page (SPA)

    Do you require a Re-test of the application after the vulnerabilities have been remediated?

    • Please provide the URL we are to assess (if available)

    • Please confirm Whether this is a Staging or Live Application

    • Please advise any testing constraints we need to be aware of, or restrictions such as specific time windows for testing.

    • Please confirm the number of accounts we are testing the application with or is this an unauthenticated assessment (without credentials).

    • Rough number of pages/endpoints for the app. (or advise if we can be provided access to determine the details ourselves.)

    Example: URL: https://mywebapplication.com (Live URL), Authenticated assessment using 2 accounts (1 x guest, 1 x admin), test after 5PM and before 9AM. ~50 pages/endpoints, 4 forms

    Example2: URL: https://stagingwebapplication.com (Staging Environment), No time limit on testing, Anonymous testing only (Unauthenticated) only - Single Login Page (SPA)

    Do you require a Re-test of the application after the vulnerabilities have been remediated?

    Do you require a Re-test of the application after the vulnerabilities have been remediated?

    • Please provide the URL we are to assess (if available)

    • Please confirm Whether this is a Staging or Live Application

    • Please advise any testing constraints we need to be aware of, or restrictions such as specific time windows for testing.

    • Please confirm the number of accounts we are testing the application with or is this an unauthenticated assessment (without credentials).

    • Rough number of pages/endpoints for the app. (or advise if we can be provided access to determine the details ourselves.)

    Example: URL: https://mywebapplication.com (Live URL), Authenticated assessment using 2 accounts (1 x guest, 1 x admin), test after 5PM and before 9AM. ~50 pages/endpoints, 4 forms

    Example2: URL: https://stagingwebapplication.com (Staging Environment), No time limit on testing, Anonymous testing only (Unauthenticated) only - Single Login Page (SPA)

    Do you require a Re-test of the application after the vulnerabilities have been remediated?

    Please provide the detail of any additional applications you would like included in your scope.

    • Please provide the URL we are to assess (if available)

    • Please confirm Whether this is a Staging or Live Application

    • Please advise any testing constraints we need to be aware of, or restrictions such as specific time windows for testing.

    • Please confirm the number of accounts we are testing the application with or is this an unauthenticated assessment (without credentials).

    • Rough number of pages/endpoints for the app. (or advise if we can be provided access to determine the details ourselves.)

    Example: URL: https://mywebapplication.com (Live URL), Authenticated assessment using 2 accounts (1 x guest, 1 x admin), test after 5PM and before 9AM. ~50 pages/endpoints, 4 forms

    Example2: URL: https://stagingwebapplication.com (Staging Environment), No time limit on testing, Anonymous testing only (Unauthenticated) only - Single Login Page (SPA)

    Do you require a Re-test of the application after the vulnerabilities have been remediated?

    If you require an API assessment, please complete the below section.

    Please advise the number of endpoints and Methods for the API as well as the number of user roles to be tested.

    e.g. 5 Endpoints, 2 API access roles, admin & sponsor

    If we are testing an API(s) is there a Postman, Swagger or WSDL file that can be populated and provided to the tester?

    Please advise the number of endpoints and Methods for the API as well as the number of user roles to be tested.

    e.g. 5 Endpoints, 2 API access roles, admin & sponsor

    If we are testing an API(s) is there a Postman, Swagger or WSDL file that can be populated and provided to the tester?

    Please advise the number of endpoints and Methods for the API as well as the number of user roles to be tested.

    e.g. 5 Endpoints, 2 API access roles, admin & sponsor

    [cf7mls_step cf7mls_step-5 "Back" "Next" "Step 5"]

    Additional Options

    Please find below the additional services we offer that you may wish to include in your engagement. Note that all options below will be in the 'additional options' section of the proposal with pricing.

    Please only tick components you would like included in your engagement.

    [cf7mls_step cf7mls_step-6 "Back" "Next" "Step 6"]

    Additional Info

    Please find below the additional services we offer that you may wish to include in your engagement

    For example:

    • Do not test URL xxxx://fqdn/uri_path,

    • Do not test for SQLi.

    • Our x system is our main critical system that extreme care should be taken on.

    [cf7mls_step cf7mls_step-7 "Back" "Next" "Step 7"]

    Follow up meeting

    Call us +61 2 8103 2030

    If you would like to have a meeting to discuss our options, approach and anything else you would like to know, our team would love to have a chat!

    Thank you for filling in our discovery questionnaire, one of our Pen test experts will review the information provided and we will reach out to go through what our proposed next steps will be for your organisation.

    [cf7mls_step cf7mls_step-8 "Back" "Step 8"]

    Never give out your password. Report abuse

    This content is created by the owner of the form. The data you submit will be sent to the form owner. Microsoft is not responsible for the privacy or security practices of its customers, including those of this form owner. Never give out your password.

    Powered by Microsoft Forms | The owner of this form has not provided a privacy statement as to how they will use your response data. Do not provide personal or sensitive information.