+971-4 813 6367
+1 (800) 456 789
techrona@mail.com
92 Bowery St., New York, NY 10013

Request a quote

Request a quote::
Scoping for
Web Application Pentest
About You
Your Full Name
Web Application Pentest Scoping

please note that all fields are mandatory please enter 'NA' or choose 'None' if a field is not applicable to you.

3- Applications type
4- Type of pentest to be conducted
5- Key Objectives
8- Where is the application hosted or going to be hosted?
9- Has this application got User LOGIN?
10- If yes - has this application got User ROLES?
13- Has this web application(s) been subjected to security assessment in the recent years?
15- Will the application be available externally for testing or on-premise?
16- Do you have any special remarks - notes or requirements to be mentioned?
Mobile Application Pentest
About You
Your Full Name
Mobile Application Pentest Scoping

please note that all fields are mandatory please enter 'NA' or choose 'None' if a field is not applicable to you.

2. Select the Mobile App Platforms (Select all the apply)
5. Has this mobile application(s) been subjected to a security assessment in the recent years?
7. For Android App - are there any code obfuscation techniques or third-party solutions for code obfuscation in the application?
9. Has this App got multiple User Roles?
11. What types of users will be accessing this App?
14. Does this App requires specific hardware or device UUIDs for testing?
18. Does the App use Authentication?
19. If yes - what type(s) of authentications does the Mobile App use?
21. What type(s) of communications channels and protocols are in use?
23. Does the application provide file upload functionality?
25. Does the App uses any protection technologies to prevent it from functioning on (jailbroken/Root) devices?
27. Will the application be available externally for testing or on-premise?
28. Do you have any special remarks - notes or requirements to be mentioned?
Secure Code Review
About You
Your Full Name
Secure Code Review Scoping

please note that all fields are mandatory please enter 'NA' or choose 'None' if a field is not applicable to you.

7. If this is an object oriented language?
9. Is this a new or legacy application?
10. If it is new - multiple code reviews will be required during the software development lifecycle - or prior to releases of the application?
11. Is software architecture and/or design documentation available and can be provided to the reviewer?
12. Do you have any other special remarks - notes or requirements to be mentioned?
Internal Network Pentest
About You
Your Full Name
Size of Your Organization
Internal Network Pentest Scoping

please note that all fields are mandatory please enter 'NA' or choose 'None' if a field is not applicable to you.

2. Key objectives of this pentest
4. Will this testing be done on a production environment?
5. Does your organization use any of the public/hybrid cloud services?
6. Please provide a list of cloud services in use by your organisation
8. Do you have any other special remarks - notes or requirements to be mentioned?
External Network Pentest
About You
Your Full Name
External Network Pentest Scoping

please note that all fields are mandatory please enter 'NA' or choose 'None' if a field is not applicable to you.

2. Key objectives of this pentest
4. Will this testing be done on a production environment?
5. Do you also want phishing simulation to be performed?
8. Do you have any other special remarks - notes or requirements to be mentioned?
Cyber Threat Hunting
About You
Your Full Name
Cyber Threat Hunting Scoping

please note that all fields are mandatory please enter 'NA' or choose 'None' if a field is not applicable to you.

3. Do you have more than one office?
5. Are these Branch office connected to the Head Office?
6. If yes - what sort of connection has it got?
7. Do you have any other special remarks - notes or requirements to be mentioned?
SIEM
About You
Your Full Name
SIEM Solution Scoping

please note that all fields are mandatory please enter 'NA' or choose 'None' if a field is not applicable to you.

Please add the devices from which SIEM will collect logs. Please enter device type, a description and the quantity. Add as many entries as you have by using the "Add New" Button. If you don't find the device type in the list, select "Other".

Some examples below:
Type Description Quantity
Windows Windows Active Directory Servers 3
Load Balancers F5 Load Balancers 3
NextGen Firewalls Palo Alto NextGen Firewalls 2
Device Type & Quantity

Repeater

Contact Info

Jebel Ali South Freezone Extention, Dubai
+971-4 813 6367
Week Days: Monday to Friday from 8:30AM - 6:00PM (GMT+4)
Sunday: Closed