For companies that want certainty about their application security.
Application Pentest: Discover vulnerabilities in your SaaS platform.
✔ Fixed rate of €5,500
✔ Completed within 3 weeks
✔ Full test (5 working days)
✔ Insight into risks and follow-up actions
✔ Dutch testers with OSCP
✔ Unlimited debriefing
✔ Free retest after adjustments
View the sample report
Vul uw gegevens in — u ontvangt het rapport binnen 24 uur.
Book a free meeting!
How is the report structured?
Management summary
Contains a management summary of the most important risks and concrete priorities per finding.
Test overview
Insight into what has and has not been tested, the progress and possible clean-up actions.
Methodology
Describes the penetration test approach and which scenarios were examined.
Findings overview
An overview of all vulnerabilities found, by severity and priority.
Extensive findings
Extensive technical descriptions of our findings, risks and potential impacts per vulnerability, including concrete mitigation advice and evidence per finding.
Or request a quote
Our people
We are a Dutch specialist team, trusted by companies at home and abroad. Our testers are seasoned, certified (OSCP) and used to thinking in terms of risks that affect you. We believe in transparency and practical advice that you can use immediately: no jargon, no wild theories, just results.
Demonstrable experience
15
Years of experience
100%
OSCP Certified
300+
Penetration testing performed
€ 0,-
To unexpected hours and invoices.
100+
VDP Disclosures

What is a pentest?
A penetration test (pentest) is a controlled attack on your application to discover vulnerabilities before malicious actors do.
Experienced specialists try to break through systems within pre-agreed frameworks, as a real attacker would do. This way you get a realistic picture of your current security.
The purpose of a pentest
The goal of a penetration test is to provide clear, directly applicable insights that allow you to demonstrably reduce risks. No theoretical lists, but demonstrated vulnerabilities with sharp prioritization and concrete improvement actions. This allows you to invest in a targeted manner in increasing your resilience with demonstrable results.
Thinking like a hacker
Our testers are experienced attackers themselves, but now in your interest. We think like a hacker: how could we get to your sensitive data? Which combination of vulnerabilities is really interesting? This provides practical and relevant insights that your development team can start working with immediately.

Why a pentest?
Many data leaks are caused by seemingly small vulnerabilities in business environments. In the cloud, customer data, business processes and your reputation are at stake. A pentest provides insight into vulnerabilities that are not found with automatic scanning. This prevents damage, meets the requirements of customers or regulators, and shows that you take security seriously.
Testing with scenarios
Every application and environment is different. This sometimes brings unique risks. That is why we at Security.Rocks start every pentest with a short business risk analysis. In doing so, we not only look at technical issues, but especially at what is really important for your organization.
Why this approach?
This way, our tests are aligned with your actual risks and you will mainly receive findings and advice that make a difference for your organization. No standard checklist, but relevant scenarios that would really keep you awake at night.
No booklet
Working out these scenarios is not a book. Usually a clear brainstorm from your daily practice is sufficient. We guide this process and use it to test in a focused, efficient and above all valuable way.
Together we determine what absolutely cannot go wrong.
Wat is écht gevoelig of vertrouwelijk?
Denk aan klant- of bedrijfsgegevens, financiële data of alles wat door regelgeving (zoals GDPR) extra bescherming vraagt.
Welke data mag absoluut niet onbetrouwbaar zijn?
Fouten in bepaalde getallen, records of processen kunnen directe impact hebben op bedrijfsvoering of compliance.
Welke diensten moeten altijd beschikbaar blijven?
We identificeren de applicatie-onderdelen die bij uitval direct tot verstoring of reputatieschade leiden.
Mogen gebruikers alleen hun eigen data zien en wijzigen?
Kan een admin meer dan strikt noodzakelijk? Is data-afscherming in alle rollen goed geregeld?
We vertalen deze risico's naar concrete testscenario's.
Wat gebeurt er als iemand processen saboteert, data manipuleert of communicatie tussen systemen onderschept?
Extra aandacht voor wat uw applicatie uniek maakt
We kijken ook naar niet-standaard processen, koppelingen met externe diensten of branche-eigen functionaliteit.
The process
01
Voorbereiding
Samen bepalen we welke systemen, applicaties of netwerken getest worden en stellen we duidelijke doelen vast die aansluiten bij de behoeften en risico's van jouw organisatie.
02
Verkenning en aanval
We verzamelen informatie om inzicht te krijgen in hoe je systemen werken. Met deze informatie voeren we gerichte aanvallen uit, vergelijkbaar met hoe een kwaadwillende hacker te werk zou gaan. Zo identificeren we zwakke plekken en risico’s.
03
Rapportage
Je ontvangt een helder en gedetailleerd rapport met onze bevindingen. Hierin staan niet alleen de kwetsbaarheden beschreven, maar ook praktische aanbevelingen om ze op te lossen. Wil je vooraf een voorbeeld van ons rapport? Dat kan!
04
Nabespreking en ondersteuning
Resultaten kunnen technisch zijn. We helpen je team de resultaten te begrijpen en hoe ze opgelost kunnen worden. Ook voeren we een gratis controletest uit om te verifiëren dat bevindingen opgelost zijn.
Did you know that the financial impact of a hack often goes beyond just restoring systems? Think of possible fines from the Dutch Data Protection Authority and especially the reputational damage to customers and partners. With a pentest you prevent yourself from running these enormous risks. Security is an investment that pays for itself many times over.
Types of Pentests
Depending on your goals and wishes, we offer different types of penetration testing:
Black box
We test without prior knowledge, as if an external attacker is knocking on the door.
Gray box
We get some user accounts or limited documentation, such as an insider with limited access.
White box
We work with full insight into your source code or internal systems for in-depth analysis of vulnerabilities and logic.
Packages and prices
The costs of a pentest are transparent and scalable, giving you control over the investment and the result.
Quick Scan
€ 500
-
Automated testing with manual control
-
Targets common vulnerabilities
-
Suitable for quickly obtaining an initial picture
-
Lead time: 1-2 days
Pentest basic
€ 3.500
-
Automated tooling + manual testing
-
Risk-based approach: We determine together which risks are most urgent for your organization and focus the test on that
-
Suitable as an initial survey for smaller applications or environments
-
Lead time: 3-4 days
Pentest complete
€ 5.500
Automated tooling + manual testing
Comprehensive risk-based approach: We address all risks relevant to your business, including more complex scenarios
Suitable for frameworks such as ISO-27001, SOC2 and organizations that want a broader security overview
Lead time: 5-6 days
-
Is een pentest veilig?Ja. Onze testers werken gecontroleerd, altijd binnen de vooraf afgesproken omgeving. Bij voorkeur testen we op een acceptatie-of stagingomgeving. Productiesystemen blijven onaangetast.
-
Hoe snel kan de pentest starten?We kunnen meestal binnen drie weken beginnen. De test zelf duurt vijf dagen; het rapport volgt kort daarna.
-
Wat kost het als er toch meer issues gevonden worden dan verwacht?Ons tarief is vast. Dat is inclusief onbeperkt nabespreken, een hertest na oplossen én alle rapportages. Geen verrassingen.
-
Moet ik technisch zijn om de rapportage te lezen?De rapportage bevat een beknopte managementsamenvatting en technische details voor ontwikkelaars. Zowel directie als techniek weten precies wat de volgende stap is.
-
Moet de applicatie offline tijdens de pentest?Nee, de pentest heeft geen impact op de beschikbaarheid van uw platform. U bepaalt zelf waar, wanneer en hoe wij mogen testen.
-
Wat gebeurt er na de test?U krijgt duidelijke adviezen, een nabespreking en indien gewenst een gratis hertest na doorgevoerde verbeteringen.
-
Zijn jullie testers gecertificeerd?Ja. Onze pentesters zijn OSCP-gecertificeerd en hebben ervaring met veel soorten SaaS omgevingen, API’s en cloudoplossingen.
-
Heeft u nog andere vragen of specifieke wensen?Neem gerust contact op, we denken graag mee.
Are you ready?
No one wants to lie awake wondering: 'Am I safe enough?'. Let us take that worry away and together take your security to the next level. We look forward to brainstorming with you!