Join
Osdire Freelance Marketplace

I will web / ethical hacking manual web application penetration testing

Laba Kumar
Offline|2:02am local time

Small Security Check

Basic vulnerability testing of one web page with a summary security report

Delivery Time
2 Days
Package Includes: see all
data:image/svg+xml,%3csvg%20width='18'%20height='18'%20viewBox='0%200%2018%2018'%20fill='none'%20xmlns='http://www.w3.org/2000/svg'%3e%3cpath%20d='M2.02684%207.18506L0.777169%208.43236C0.626925%208.58246%200.542442%208.78608%200.542295%208.99845C0.542147%209.21082%200.626347%209.41456%200.776382%209.56486L2.02524%2010.8149L1.56917%2012.517C1.51419%2012.7222%201.54297%2012.9408%201.64918%2013.1248C1.7554%2013.3088%201.93035%2013.443%202.13554%2013.498L3.83684%2013.9539L4.29446%2015.6595C4.3494%2015.8646%204.48357%2016.0396%204.66748%2016.1458C4.7586%2016.1984%204.85918%2016.2326%204.9635%2016.2463C5.06781%2016.26%205.17381%2016.253%205.27543%2016.2258L6.98201%2015.7676L8.23065%2017.0185C8.38086%2017.1687%208.58458%2017.2531%208.79701%2017.2531C9.00943%2017.2531%209.21316%2017.1687%209.36337%2017.0185L10.6135%2015.7696L12.3148%2016.2255C12.52%2016.2805%2012.7386%2016.2517%2012.9226%2016.1455C13.1065%2016.0393%2013.2408%2015.8643%2013.2957%2015.6591L13.7516%2013.9578L15.4582%2013.4997C15.5598%2013.4724%2015.6551%2013.4253%2015.7386%2013.3612C15.822%2013.2971%2015.892%2013.2171%2015.9446%2013.126C15.9971%2013.0348%2016.0312%2012.9341%2016.0448%2012.8297C16.0584%2012.7254%2016.0513%2012.6194%2016.024%2012.5177L15.5654%2010.8127L16.815%209.5654C16.9648%209.415%2017.049%209.21149%2017.0494%208.99923C17.0497%208.78698%2016.9661%208.58321%2016.8168%208.43234L15.5679%207.18225L16.0238%205.48095C16.0788%205.27576%2016.05%205.05713%2015.9438%204.87317C15.8376%204.6892%2015.6626%204.55496%2015.4574%204.49998L13.7554%204.0439L13.2972%202.33733C13.2601%202.20189%2013.1883%202.07844%2013.089%201.97914C12.9897%201.87984%2012.8663%201.80809%2012.7308%201.77097C12.5962%201.7349%2012.4528%201.73462%2012.3152%201.77155L10.6102%202.23015L9.36134%200.980061C9.21124%200.829817%209.00762%200.745334%208.79525%200.745186C8.58288%200.745038%208.37914%200.829237%208.22884%200.979271L6.97952%202.22832L5.27821%201.77246C5.07302%201.71748%204.85439%201.74626%204.67043%201.85248C4.48646%201.95869%204.35222%202.13364%204.29724%202.33883L3.84137%204.04013L2.13479%204.4983C2.03314%204.52559%201.93786%204.57263%201.8544%204.63676C1.77095%204.70088%201.70094%204.78083%201.6484%204.87202C1.59585%204.96321%201.5618%205.06387%201.54818%205.16823C1.53456%205.27259%201.54164%205.37862%201.56902%205.48024L2.02684%207.18506ZM9.69208%2013.3933C9.38422%2013.3107%209.12178%2013.1092%208.96249%2012.8331C8.80321%2012.557%208.76013%2012.229%208.84273%2011.9211C8.92533%2011.6132%209.12685%2011.3508%209.40295%2011.1915C9.67904%2011.0322%2010.0071%2010.9892%2010.315%2011.0718C10.6228%2011.1544%2010.8853%2011.3559%2011.0446%2011.632C11.2038%2011.9081%2011.2469%2012.2361%2011.1643%2012.544C11.0817%2012.8519%2010.8802%2013.1143%2010.6041%2013.2736C10.328%2013.4329%209.99994%2013.4759%209.69208%2013.3933ZM11.4501%205.90391L12.4394%207.16323L6.13894%2012.1088L5.14962%2010.8494L11.4501%205.90391ZM7.89675%204.62011C8.04919%204.66101%208.19208%204.73153%208.31726%204.82766C8.44244%204.92378%208.54747%205.04361%208.62634%205.18032C8.70521%205.31703%208.75638%205.46794%208.77692%205.62442C8.79747%205.78091%208.787%205.93991%208.7461%206.09235C8.7052%206.24478%208.63467%206.38767%208.53855%206.51285C8.44243%206.63803%208.32259%206.74306%208.18588%206.82193C8.04917%206.90079%207.89827%206.95196%207.74178%206.97251C7.5853%206.99306%207.4263%206.98259%207.27386%206.94169C6.966%206.85908%206.70356%206.65757%206.54427%206.38147C6.38499%206.10537%206.34191%205.77731%206.42451%205.46945C6.50711%205.16159%206.70863%204.89915%206.98473%204.73987C7.26082%204.58059%207.58889%204.53751%207.89675%204.62011Z'%20fill='%23D8BC7F'/%3e%3c/svg%3e2

Service details

Manual Web Application Penetration Testing (OWASP Top 10)

πŸ“Œ Description

I will perform manual web application penetration testing to identify real-world security vulnerabilities before attackers do. This service focuses on logic flaws and exploitable weaknesses that automated scanners miss.

πŸ” What I Test

  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Authentication & Authorization flaws
  • Broken Access Control
  • CSRF
  • File Upload & RCE
  • Security Misconfigurations
  • Business Logic Vulnerabilities

πŸ“„ What You Get

  • Detailed vulnerability report (PDF)
  • Risk severity (Critical / High / Medium / Low)
  • Proof of Concept (PoC) screenshots or steps
  • Clear remediation recommendations
  • Retesting after fixes (optional)

🎯 Best For

  • Startups & small businesses
  • Production or staging web apps
  • Bug bounty–style testing

⚠️ Requirements

  • Target URL
  • Test credentials (if applicable)
  • Written permission to test

βœ… Why Choose Me

  • Manual testing (no blind automation)
  • Real attacker mindset
  • Clear, actionable reports
  • Responsible & ethical testing

Key details

  • Service Type
    Vulnerability AssessmentPenetration TestingWeb Application PentestAPI PentestNetwork Pentest
  • Expertise
    Application SecurityNetwork SecurityVulnerability Management
  • Tech Scope
    Operating SystemsWeb ApplicationsNetworksFirewalls
  • Framework / Standard
    Mitre Att&CkOwasp
Special note from freelancer
Security testing will be performed only after receiving written authorization from the client

FAQs

Yes written permission is required before starting any security testing
Laba Kumar

Laba Kumar

Launch Offer Earn up to $500* extra on your first 10 offers created

Terms and conditions apply