
PENTESTING Solutions
CUSTOMER INDUSTRIES
- Government - Healthcare - IT/Cybersecurity
- VIP - Hospitality - Education - Military
CYBERSECURITY MEXICAN LAW
Mexico presented to the Committee against Drugs and Crime, of the United Nations (UN), the text and process of elaboration of its first Cybersecurity Law, which seeks to protect the citizens of this country with four lines of action
1) Ensure national security by defending the digital space
2) Create a legal framework that allows sanctioning or typifying cyberattacks
3) Carry out annual penetration tests or "pentesting" to public and private institutions every quarter at least for financial institutions or with a payment system in place
4) Create a National Cybersecurity Agency controlled by the Executive Branch
This is why your company has to perform at least once a year a Penetration test, otherwise, the fine can reach up to 9 Million Mexican pesos.
We invite you to choose us as your Penetration Test Company for the years to come!
President & CEO
CHOOSE YOUR SERVICE
CYBER THREAT INTELLIGENCE

We will search deep in the three layers of the internet to find information of your company, individual or group

We check any misconfiguration or exposed cloud services on the internet

PRICE LIST

Choose the plan that best suites for you. Contact our experts for any question you may have.
All prices listed are before taxes
WEB APPLICATION PENTEST
CONTAINER PENTEST
CLOUD PENTEST

PRICE LIST

AMAZON AWS CLOUD SECURITY (OFFENSIVE)
PENTESTING
-
Identifying the AWS Accounts IDs from a Public S3 Bucket : This is a technique that can find an AWS account ID given a public S3 bucket, and how this can be leveraged.
-
AWS IAM Enumeration : This is a technique of AWS CLI as well as IAM user, role, group, and policy enumeration.
-
AWS S3 Enumeration : This techniques demonstrated one of the most popular AWS services - S3 (Simple Storage Service), and show how attackers can use it to get a foothold and escalate privileges in a cloud environment.
-
Pillage Exposed RDS Instances : This technique demonstrates the danger of publicly accessible Amazon Relational Database Service (RDS) instances, and how this can be leveraged by an attacker. Advice on remediation and detection is also included.
-
SSRF : This technique showcase how a Server Side Request Forgery (SSRF) vulnerability can potentially be much more severe, when the website is hosted on an EC2 instance.
-
Path Traversal to AWS credentials to S3 : This technique showcase how a path traversal vulnerability can result in gaining a foothold in a cloud environment. Path, or directory traversal is also known as a dot-dot-slash attack.
-
Loot Public EBS Snapshots : This technique shows about the dangers of public EBS snapshots, and how this can be leveraged by an attacker. Advice on remediation and detection is also included.
-
Plunder Public RDS Snapshots : This technique shows about the danger of public Amazon Relational Database Service (RDS) snapshots, and how this can be leveraged by an attacker. Advice on remediation and detection is also included.
-
Access Secrets with S3 Bucket Versioning : This technique shows about the potential dangers of S3 bucket versioning, if the admins have not sufficiently restricted who can access them, and about the dangers of inadequate data segregation and storing secrets in plain text fields. Advice on remediation is also included.
-
Execute and Identify Credential Abuse in AWS : This technique showcase variety of credential abuse techniques and how they can be detected and mitigated.
-
Assume Privileged Role with External ID : This technique showcase the real-world danger of exposed configuration files, and how using production accounts for testing policies can be leveraged to assume a role that has access to secret information.
-
Leverage Insecure Storage and Backups for Profit : This technique howcase how backup files on accessible storage can be used to further access within a cloud environment and domain.
-
Uncover Secrets in CodeCommit and Docker : This technique howcase a common issue, leaked credentials in Docker images.
-
S3 Bucket Brute Force to Breach : This technique shows about the dangers of sensitive data stored on public S3 buckets, and how threat actors can discover them, and gain information that allows them to move laterally and vertically in a cloud environment. Advice on remediation and detection is also included.
-
Abuse Cognito User and Identity Pools : This technique showcase how Cognito User and Identity Pool configurations can allow malicious actors to gain a foothold in cloud infrastructure. Also shows how Lambda can be abused to move laterally and vertically in an environment.
-
Leverage Leaked Credentials : This technique showcase how leaked secrets can result in a malicious actor pwning a cloud environment and accessing personally identifiable information (PII).
-
Secrets in Git Repos : This technique showcase a common issue, leaked credentials in git repositories.
-
Secure S3 with Amazon Macie : This technique shows about Amazon Macie, and how to discover sensitive data as well as highlighting buckets that are world-readable and world-writable.
MICROSOFT AZURE CLOUD SECURITY (OFFENSIVE)
PENTESTING
-
Azure Blob Container to Initial Access : This demonstrates show how attackers can use it to access secrets and get a foothold in a cloud environment.
-
Unlock Access with Azure Key Vault : This showcase how attackers can leverage common services to move laterally in an Azure environment.
Choose the plan that best suites for you. Contact our experts for any question you may have.
All prices listed are before taxes
AI-Automated Penetration Testing - The AI Learning technology accelerates and intelligently automates over 10,000 checks of your web application security, which usually require human labor and cannot be performed by traditional vulnerability scanners due to complexity
Zero False-Positives SLA - Our Terms of Conditions provide contractual money back for that specific finding. The money back will be divided between all the findings. For example, if 17 vulnerabilities were found and one of them resulted in a false positive, the paid price will be divided between the main 9 services, divided my the number of findings. Eg. 200,000/9 = 22,222/17 = 1,307.
Fast Delivery SLA - Our Terms of Conditions guantee the delivery on the time specified by the SLA
WAF Virtual Patching - If available, we can provide a ready-to-use WAF rule-sets with your Penetration Test report to automatically mitigate the detected vulnerabilities.
Unlimited Patch Verification Scans - Unlimited patch verification scans are available during 30 days after the delivery of your Penetration Test reports to verify that all the detected vulnerabilities have been properly fixed by your software developers.
Website Privacy Assessment - Our scans will find privacy and compliance issues to it can be fixed by your security team.
Dark Web Reconnaissence - Our scans will find your organization’s exposure on Dark Web, such as stolen credentials, and leverage this data during the Pentest.
Pentest Certificate - Upon completion of the Pentest, you’ll get a signed certificate for Compliance or regulatory purposes
NOTE: Only this service has the feature of False Positive money back option.
MOBILE PENTEST

Frequently Asked Questions
Do I need two packages for iOS and Android versions of the same app?
Yes.
Can you test mobile applications built with Xamarin or Flutter?
Yes, we can test applications built with any mobile frameworks or technologies. However, complicated cross-platform frameworks, such as Xamarin and Flutter, impose additional challenges that usually require supplementary resources and human time for comprehensive testing of the application. Therefore, the minimum required package for those frameworks is MobileSuite Corporate.

PRICE LIST

Choose the plan that best suites for you. Contact our experts for any question you may have.
All prices listed are before taxes
AI-Automated Penetration Testing - The AI Learning technology accelerates and intelligently automates over 10,000 checks of your web application security, which usually require human labor and cannot be performed by traditional vulnerability scanners due to complexity
Zero False-Positives SLA - Our Terms of Conditions provide contractual money back for that specific finding. The money back will be divided between all the findings. For example, if 17 vulnerabilities were found and one of them resulted in a false positive, the paid price will be divided between the main 9 services, divided my the number of findings. Eg. 200,000/9 = 22,222/17 = 1,307.
Fast Delivery SLA - Our Terms of Conditions guantee the delivery on the time specified by the SLA
WAF Virtual Patching - If available, we can provide a ready-to-use WAF rule-sets with your Penetration Test report to automatically mitigate the detected vulnerabilities.
Unlimited Patch Verification Scans - Unlimited patch verification scans are available during 30 days after the delivery of your Penetration Test reports to verify that all the detected vulnerabilities have been properly fixed by your software developers.
Website Privacy Assessment - Our scans will find privacy and compliance issues to it can be fixed by your security team.
Dark Web Reconnaissence - Our scans will find your organization’s exposure on Dark Web, such as stolen credentials, and leverage this data during the Pentest.
Pentest Certificate - Upon completion of the Pentest, you’ll get a signed certificate for Compliance or regulatory purposes
Cross-Platform Apps Testing - Some applications required more resources and time, so this scan does the job.
Root or Jailbreak Detection Bypass - Can detect if any device has a root privilege or it has been jailbroken.
Emulator Detection Bypass - Detects if any device prevents on running on an emulator or requires to be tested on a real device.
Certificate Pinning Bypass - If the devices use SSL certificate pinning technology it’ll be detected.
Code Obfuscation Bypass - It will detect if any device uses any code is obfuscated to prevent reverse-engineering.
IOT PENTEST



IoT devices are manufactured to fulfill the general needs of an organization; therefore, they lack strict security protocols. Attackers have been using this advantage to break into the system of an organization through any of the weak IoT devices.
IoT attacks are cyber-attacks that gain access to users' sensitive data with the help of any IoT device. Attackers usually install malware on the device, harm the device, or gain access to further personal data of the company.
VAPT Process
IOT Device Security Testing
Wireless Protocol Security Testing
IOT Device Firmware Security Testing
IOT Device Application Security Testing
IOT Cloud API Security Testing
PRICE LIST

Choose the plan that best suites for you. Contact our experts for any question you may have.
All prices listed are before taxes
FACILITIES PENTEST
A physical penetration test assesses all physical security controls, including locks, fences, security guards, cameras, and other security measures. During a physical penetration test, attempts to thwart these controls to gain physical access to restricted areas, identify sensitive data, and gain an entry to a network.
Benefits of Performing a Physical Penetration Test
There are two main benefits to perform a Physical Pentest:
- Expose weak physical barriers: Pentesters will assess and expose physical security vulnerabilities like gaps in fences, doors that are hung improperly, and procedures that are not followed.
- Understand the risks: As part of the vulnerability assessment, Pentesters will perform simulated attacks against physical barriers, which will provide an idea of the kind of damage that any security weaknesses could leave your business exposed to. When companies know the degree of damage they could face, they can prioritize remediation actions.



PRICE LIST

Choose the plan that best suites for you. Contact our experts for any question you may have.
All prices listed are before taxes
What's included?
- Tax Invoice
- Support 24/7 during a month
- Executive Reports (Technical/Regular)
IMPORTANT
There is a down payment of 50%** by signing contract and the rest, by finishing the PENTEST.
*** NO EXCEPTIONS



PCI-DSS (6.5.1-6.5.10)

OWASP TOP 10

OWASP API TOP 10

CUSTOMER INDUSTRIES
- Government - Healthcare - IT/Cybersecurity
- VIP - Hospitality - Education - Military