Services

Security & Vulnerability Assessment:

I test your systems safely, legally, and ethically. After testing, I provide a clear report that explains:

  • What was checked
  • What problems (if any) were found
  • How to fix them — in plain, easy-to-understand language

How it works:

Most assessments take 7–10 days, depending on the size of your website or network. I provide a clear timeline before starting, so you know exactly what to expect.

Services & Prices:

ServiceWhat it meansStarting Price
Quick Security CheckLook for obvious weaknesses in your website or small system (No exploitation and further attacks).$400
Web-Application Penetration
Testing
Test your website for common vulnerabilities such as login issues, data leaks,security gaps and OWASP 2021 Common Vulnerabilities (SQL & OS Command Injection, Directory Traversal).$800
External Network Penetration TestingCheck your servers or systems that are visible on the internet for weaknesses that I discover before hackers do.$1,000
Internal Network Penetration TestingCheck your office network to see what someone inside (like an employee or intruder) could access.$1,500
Windows Network Check (Active Directory)Check your company login system to make sure employee accounts and permissions are secure.$2,000
Simulated Attack (Red Team Lite)Run a short, controlled “ethical hack” to test your organization’s security defenses in real-world scenarios.$2,500

Note: These are the base prices. If I find serious issues that need extra work, I will discuss the cost with you before proceeding.

Safe & Legal Testing:

  • Written permission required before starting any testing.
  • High-risk tests (like Red Team or Active Directory) are recommended to run on copies of your system, so your live systems are safe.
  • Access is temporary, using secure VPNs or test accounts; credentials are rotated after testing.
  • All findings are kept confidential.
  • Deliverables include a clear report with an executive summary and step-by-step guidance.

Important Safeguards & Process – Extra details of Safe & Legal Testing:

To ensure your systems remain safe, secure, and fully operational during testing, I follow a strict, professional process:

  1. Written Authorization – I will only start testing after receiving formal permission from you. This ensures all work is legal and authorized.
  2. Scope Agreement – We define exactly what systems, applications, or networks will be tested. Nothing outside this scope will be touched.
  3. Risk Assessment – Before testing, I evaluate potential risks to avoid accidental disruption or downtime.
  4. Safe Testing Environment – For high-risk tests, I recommend using a copy or virtualized version of your systems. Your live systems remain untouched.
  5. Temporary Access – Any access provided (like VPNs, credentials, or accounts) is limited in time and scope. Credentials are rotated or revoked immediately after testing.
  6. Confidentiality – All information, findings, and reports are kept private and shared only with authorized personnel.
  7. Clear Reporting – After testing, I provide:
    • A simple summary of key findings for managers
    • Detailed step-by-step instructions for fixing any issues
  8. Follow-up Support – I can advise on fixes or retest to ensure vulnerabilities are properly addressed.

CTF Participation & Collaboration:

I can also join CTF teams or help create CTF challenges.

Compensation or prize sharing is agreed in advance.

Contact Me:

If you want to protect your website or network, or just want to learn more:

📧 chidunguyen2408@gmail.com

I’ll reply with a short intake form to understand your needs and a proposed plan.

Legal & Ethical Statement:

All work is fully authorized and legal. I do not hack anyone or anything without permission. My services are designed to help you improve security safely and responsibly.