For companies that want certainty about their application security.
Application Pentest: Discover vulnerabilities in your SaaS platform.
✔ Fixed rate of €5,500
✔ Completed within 3 weeks
✔ Full test (5 working days)
✔ Insight into risks and follow-up actions
✔ Dutch testers with OSCP
✔ Unlimited debriefing
✔ Free retest after adjustments
How is the report structured?
Management summary
Contains a management summary of the most important risks and concrete priorities per finding.
Test overview
Insight into what has and has not been tested, the progress and possible clean-up actions.
Methodology
Describes the penetration test approach and which scenarios were examined.
Findings overview
An overview of all vulnerabilities found, by severity and priority.
Extensive findings
Extensive technical descriptions of our findings, risks and potential impacts per vulnerability, including concrete mitigation advice and evidence per finding.
Book a free meeting!
Demonstrable experience
15
Years of experience
100%
OSCP Certified
300+
Penetration testing performed
€ 0,-
To unexpected hours and invoices.
100+
VDP Disclosures
Our people
We are a Dutch specialist team, trusted by companies at home and abroad. Our testers are seasoned, certified (OSCP) and used to thinking in terms of risks that affect you. We believe in transparency and practical advice that you can use immediately: no jargon, no wild theories, just results.

What is a pentest?
A penetration test (pentest) is a controlled attack on your application to discover vulnerabilities before malicious actors do.
Experienced specialists try to break through systems within pre-agreed frameworks, as a real attacker would do. This way you get a realistic picture of your current security.
The purpose of a pentest
The goal of a penetration test is to provide clear, directly applicable insights that allow you to demonstrably reduce risks. No theoretical lists, but demonstrated vulnerabilities with sharp prioritization and concrete improvement actions. This allows you to invest in a targeted manner in increasing your resilience with demonstrable results.
Thinking like a hacker
Our testers are experienced attackers themselves, but now in your interest. We think like a hacker: how could we get to your sensitive data? Which combination of vulnerabilities is really interesting? This provides practical and relevant insights that your development team can start working with immediately.

Why a pentest?
Many data leaks are caused by seemingly small vulnerabilities in business environments. In the cloud, customer data, business processes and your reputation are at stake. A pentest provides insight into vulnerabilities that are not found with automatic scanning. This prevents damage, meets the requirements of customers or regulators, and shows that you take security seriously.
Testing with scenarios
Every application and environment is different. This sometimes brings unique risks. That is why we at Security.Rocks start every pentest with a short business risk analysis. In doing so, we not only look at technical issues, but especially at what is really important for your organization.
Why this approach?
This way, our tests are aligned with your actual risks and you will mainly receive findings and advice that make a difference for your organization. No standard checklist, but relevant scenarios that would really keep you awake at night.
No booklet
Working out these scenarios is not a book. Usually a clear brainstorm from your daily practice is sufficient. We guide this process and use it to test in a focused, efficient and above all valuable way.
Together we determine what absolutely cannot go wrong.
What is really sensitive or confidential?
Think of customer or company data, financial data or anything that requires extra protection due to regulations (such as GDPR).
What data must absolutely not be unreliable?
Errors in certain numbers, records or processes can have a direct impact on business operations or compliance.
Which services should always remain available?
We identify the application components that, in the event of a failure, will immediately lead to disruption or reputational damage.
Should users only be able to see and edit their own data?
Can an admin do more than strictly necessary? Is data protection properly arranged in all roles?
We translate these risks into clear test scenarios.
What happens if someone sabotages processes, manipulates data, or intercepts communications between systems?
Extra attention to what makes your application unique
We also look at non-standard processes, links with external services or industry-specific functionality.
The process
01
Preparation
Together we determine which systems, applications or networks will be tested and we establish clear goals that match the needs and risks of your organization.
02
Reconnaissance and attack
We collect information to understand how your systems are working. With this information, we perform targeted attacks, similar to how a malicious hacker would operate. This way, we identify weaknesses and risks.
03
Reporting
You will receive a clear and detailed report with our findings. This not only describes the vulnerabilities, but also practical recommendations to solve them. Would you like a sample of our report in advance? That is possible!
04
Debriefing and support
Results can be technical. We help your team understand the results and how to fix them. We also perform a free audit test to verify that findings have been resolved.
Did you know that the financial impact of a hack often goes beyond just restoring systems? Think of possible fines from the Dutch Data Protection Authority and especially the reputational damage to customers and partners. With a pentest you prevent yourself from running these enormous risks. Security is an investment that pays for itself many times over.
Types of Pentests
Depending on your goals and wishes, we offer different types of penetration testing:
Black box
We test without prior knowledge, as if an external attacker is knocking on the door.
Gray box
We get some user accounts or limited documentation, such as an insider with limited access.
White box
We work with full insight into your source code or internal systems for in-depth analysis of vulnerabilities and logic.
Packages and prices
The costs of a pentest are transparent and scalable, giving you control over the investment and the result.
Quick Scan
€ 500
-
Automated testing with manual control
-
Targets common vulnerabilities
-
Suitable for quickly obtaining an initial picture
-
Lead time: 1-2 days
Pentest basic
€ 3.500
-
Automated tooling + manual testing
-
Risk-based approach: We determine together which risks are most urgent for your organization and focus the test on that
-
Suitable as an initial survey for smaller applications or environments
-
Lead time: 3-4 days
Pentest complete
€ 5.500
Automated tooling + manual testing
Comprehensive risk-based approach: We address all risks relevant to your business, including more complex scenarios
Suitable for frameworks such as ISO-27001, SOC2 and organizations that want a broader security overview
Lead time: 5-6 days
-
Is een pentest veilig?Ja. Onze testers werken gecontroleerd, altijd binnen de vooraf afgesproken omgeving. Bij voorkeur testen we op een acceptatie-of stagingomgeving. Productiesystemen blijven onaangetast.
-
Hoe snel kan de pentest starten?We kunnen meestal binnen drie weken beginnen. De test zelf duurt vijf dagen; het rapport volgt kort daarna.
-
Wat kost het als er toch meer issues gevonden worden dan verwacht?Ons tarief is vast. Dat is inclusief onbeperkt nabespreken, een hertest na oplossen én alle rapportages. Geen verrassingen.
-
Moet ik technisch zijn om de rapportage te lezen?De rapportage bevat een beknopte managementsamenvatting en technische details voor ontwikkelaars. Zowel directie als techniek weten precies wat de volgende stap is.
-
Moet de applicatie offline tijdens de pentest?Nee, de pentest heeft geen impact op de beschikbaarheid van uw platform. U bepaalt zelf waar, wanneer en hoe wij mogen testen.
-
Wat gebeurt er na de test?U krijgt duidelijke adviezen, een nabespreking en indien gewenst een gratis hertest na doorgevoerde verbeteringen.
-
Zijn jullie testers gecertificeerd?Ja. Onze pentesters zijn OSCP-gecertificeerd en hebben ervaring met veel soorten SaaS omgevingen, API’s en cloudoplossingen.
-
Heeft u nog andere vragen of specifieke wensen?Neem gerust contact op, we denken graag mee.
Are you ready?
No one wants to lie awake wondering: 'Am I safe enough?'. Let us take that worry away and together take your security to the next level. We look forward to brainstorming with you!