Manual Penetration Testing

Real Pentests by Real Experts.

Whether you’re looking to complete your first pentest, or just looking for a fresh set of eyes, our friendly & experienced penetration testers are here to help.

Get a Quote
Straightforward Scoping
Fast Turn Around Times
Easy-to-Use Dashboard
Retesting Included

Comprehensive, manual penetration testing tailored to your organization's specific needs.

Our experienced team of certified US-based pentesters goes beyond automated scanning to identify critical vulnerabilities and help you meet your compliance demands. Whether you need compliance testing, want to validate your security controls, or require a comprehensive security assessment, our manual testing approach uncovers the issues that matter most to your business.

Our team holds industry-leading credentials, including OSCP, OSWA, PWPP, and CAPenX.

Find the right type of pentesting for your business.

Penetration testing starts at $4,975.

Every Pentest Includes

FAQs

What types of pentests do you offer?

We offer a variety of penetration testing services to meet different security needs:

  • Web Application Penetration Testing: Comprehensive security assessment of custom web applications, including OWASP Top 10 vulnerabilities, SQL injection testing, XSS detection, and authentication bypass techniques.
  • External Network Security Testing: Thorough vulnerability assessment and exploitation of internet-facing assets, firewall configurations, VPN endpoints, and exposed services to identify remote attack vectors.
  • PCI DSS Compliance Testing: Specialized penetration testing to meet PCI DSS Requirement 11.3, including segmentation testing, cardholder data environment (CDE) assessment, and compliance validation.
  • API Security Testing: In-depth security analysis of RESTful APIs, GraphQL endpoints, SOAP services, webhooks, and microservices, testing for broken authentication, excessive data exposure, and injection vulnerabilities.
  • Internal Network Penetration Testing: Comprehensive internal infrastructure assessment simulating insider threats, testing Active Directory security, domain escalation paths, and lateral movement opportunities.
  • Mobile Application Security Testing: Expert iOS and Android app penetration testing covering OWASP MASVS, reverse engineering, data storage vulnerabilities, and platform-specific security controls.
  • Wireless Network Security Assessment: Professional WiFi penetration testing including WPA/WPA2/WPA3 attacks, evil twin assessments, bluetooth security, and wireless intrusion detection system evasion.
  • Red Team Exercises: Advanced persistent threat (APT) simulation combining physical security testing, social engineering, and technical exploitation to evaluate defensive capabilities and incident response readiness.
  • Social Engineering Assessments: Targeted phishing simulations, vishing campaigns, pretexting scenarios, and physical security testing to evaluate employee security awareness and human firewall effectiveness.

What does a pentest scoping entail?

Penetration test scoping is a crucial initial step in our process. We begin by meeting with you to understand your specific needs, the scope of the project, and your overall security objectives. During this meeting, we'll ask a few simple yet important questions to gather necessary information about your systems, applications, and network environment. Using this information, we determine the amount of time needed to conduct a thorough and effective penetration test. Based on our assessment, we then provide a fixed-price quote for our services, ensuring transparency and allowing you to budget effectively for the security assessment.

Can I see a sample report?

Of course, you can download a sample application pentest report here.

How much does a pentest cost?

The cost of a penetration test varies based on the size and complexity of the project. A penetration test for a simple application or small network generally starts at $4,975. For more complex applications with many user roles or features, or larger networks, we'll provide a fixed-price quote after an initial scoping call to ensure we thoroughly understand your needs and the scope of the testing required.

Who are the pentesters?

Our assessments are performed by experienced US-based security professionals who conduct remote investigations, review documentation, and contribute to the presentation of findings in the report.

Our team holds industry-leading credentials, including OSCP, OSWA, PWPP, and CAPenX.

What deliverables come with a penetration test?

All penetration tests come with two primary deliverables:

Penetration Testing Report:

A comprehensive report detailing the findings of the test. This report outlines identified vulnerabilities, their potential impact, and recommendations for remediation. It serves as a valuable resource for your team to address any security gaps.

Attestation Letter:

A letter describing the test and its scope. This attestation letter is perfect for fulfilling client requirements and demonstrating that a professional security assessment has been conducted on your systems.

Can you help with SOC2, HIPAA, or GDPR?

Yes, our penetration tests can be used to help fulfill compliance requirements for many of the major regulatory frameworks and standards, including SOC2, HIPAA, or GDPR. Our thorough assessments and comprehensive reports provide the necessary documentation and insights to support your compliance efforts.

What do you test for?

Our testing methodology adheres to audit procedures and established criteria, ensuring consistency and compliance with industry standards, including the Payment Card Industry (PCI) Data Security Standard requirement 11.3. Our examination follows information system security assessment best practices outlined by the Open Source Security Testing Methodology Manual (“OSSTMM”) and The National Institute of Standards and Technology (“NIST”) Special Publication 800-42, Guideline on Network Security Testing.

Web application penetration tests cover OWASP security threats, including:

  • SQL Injection
  • Authentication Flaws
  • Directory Traversal
  • OS Command Injection
  • Business Logic Vulnerabilities
  • Information Disclosure
  • Access Control Vulnerabilities
  • Server-Side Request Forgery (SSRF)
  • XML External Entity (XXE) Injection
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Cross-Origin Resource Sharing (CORS)
  • Clickjacking
  • DOM-Based Vulnerabilities
  • WebSockets Vulnerabilities
  • Insecure Deserialization
  • Server-Side Template Injection (SSTI)
  • Web Cache Poisoning
  • HTTP Host Header Attacks
  • HTTP Request Smuggling
  • OAuth Authentication

How long does a pentest take?

The duration of a penetration test depends on the size and complexity of the project. Typically, reports are delivered within 2-4 weeks.

Is retesting included?

Yes, one round of retesting is included with our penetration tests. After we provide the initial report and your team addresses the vulnerabilities found, we conduct a retest to ensure that the remediation actions have been successfully implemented. We then provide you with an updated report reflecting the current security status of your systems.

Meet Halo Security.

Our friendly team is here to help.

Get in Touch
  • 100% US-Based Staff
  • 11+ Years in Business
  • 2,000+ Clients Served
  • 98%+ Support Satisfaction
A Few Of Our Customers