RE: Web application security testing pricing

From: Dawes, Rogan (ZA - Johannesburg) (rdawes@deloitte.co.za)
Date: Mon Oct 06 2003 - 11:26:30 EDT


I price it according to the complexity of the site, and the applications
running on it.

Our service is largely an "assisted-manual" approach, with tools such as
Exodus (http://home.intekom.co.za/rdawes/exodus.html) and WebScarab
(http://www.owasp.org/development/webscarab) assisting us to observe and
understand the layout of the site, and the application logic, the parameters
sent, etc.

After that, it is a process of stepping through each of the identified
applications/servlets/etc, understanding the relation to the other servlets,
applications, etc, understanding what the parameters influence, identifying
vulnerabilities in the parameters, etc.

As part of the scoping exercise, I like to get the client to step through
the major application with me, while I observe using Exodus or WebScarab.
That gives me a pretty good idea of the complexity, and that allows me to
estimate the price a lot more accurately than one would otherwise be able
to. (Unless, of course, the site in question is already live and accessible
via the Internet)

Rogan

> -----Original Message-----
> From: Lachniet, Mark [mailto:mlachniet@sequoianet.com]
> Sent: 06 October 2003 04:50 PM
> To: cisspforum@yahoogroups.com; pen-test@securityfocus.com
> Subject: Web application security testing pricing
>
>
> Hello all,
>
> Please forgive the cross-posting. I was wondering if anyone could
> comment on how they have seen web application security analysis work
> priced. By this, I do not mean the typical vulnerability assessment,
> but an assessment of the ASP/SQL code - looking for SQL
> injections, for
> example. I'm curious to hear from both consultants who offer the
> services, and managers who have purchased it. Also, if this
> was largely
> automated (using SPI or Sanctum for example) or if there was a lot of
> hands-on analysis by a skilled tester.
>
> It seems that the industry is somewhat inconsistent in this regard,
> which makes it difficult for organizations to select the most
> appropriate service for their needs. If I get sufficient responses, I
> will try to summarize the comments.
>
> Thanks,
>
> Mark Lachniet
>
> --------------------------------------------------------------
> -------------
> Tired of constantly searching the web for the latest exploits?
> Tired of using 300 different tools to do one job?
> Get CORE IMPACT and get some rest.
> www.coresecurity.com/promos/sf_ept2
> --------------------------------------------------------------
> --------------
>

Important Notice: This email is subject to important restrictions, qualifications and disclaimers ("the Disclaimer") that must be accessed and read by clicking here or by copying and pasting the following address into your Internet browser's address bar: http://www.Deloitte.co.za/Disc.htm. The Disclaimer is deemed to form part of the content of this email in terms of Section 11 of the Electronic Communications and Transactions Act, 25 of 2002. If you cannot access the Disclaimer, please obtain a copy thereof from us by sending an email to ClientServiceCentre@Deloitte.co.za.

---------------------------------------------------------------------------
Tired of constantly searching the web for the latest exploits?
Tired of using 300 different tools to do one job?
Get CORE IMPACT and get some rest.
www.coresecurity.com/promos/sf_ept2
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:40 EDT