Frequently Asked Questions
What’s the average price for a pentest?
We’d love to schedule a discovery call with you. We work with businesses of all sizes and budgets to provide top quality penetration testing services.
While we will happily email you a generic weekly quote, we will need a scoping call to accurately estimate the many factors that impact the cost of a pentest based on complexity, fluctuating resource needs, after-hours effort, and reporting time. We also offer discounts for bundling services.
Connect with us for our rate card.
How long does a pentest usually take?
For smaller companies, we can typically execute an internal and external pentest within one to two weeks. Larger or more complex organizations typically require four to six week engagements.
We also offer Purple Team Consulting and Red Team Exercises for organizations that want to train and test their security team and strengthen infrastructure.
How many cybersecurity engineers will be working on my pentest?
We have an all-hands on deck model, where any pentest could have 2-5 security engineers engaged at once. Each engagement is also led by a Project Manager and Lead Engineer for quality control. If you haven’t read this article yet, Benefits of Partnering with Exploit Strike, go check it out. There are many benefits to partnering with a smaller cybersecurity firm, including our Top Talent working directly on each engagement.
Why did someone call me about leaked credentials?
Our team has created a threat intelligence tool, Exploit Shield, that searches the public web for leaked credentials. If we’re contacting you, it’s not a sales call; we are attempting to conduct a responsible vulnerability disclosure.
While many companies have a Vulnerability Disclosure Program, in our experience, we have found that third party leaks are often not being shared with the affected organization. We are happy to go this route, but want to make sure your company has situational awareness to remediate as soon as possible.
Does Exploit Strike notify vendors about leaked credentials?
The information provided by Exploit Strike is shared in good faith for the purpose of improving cybersecurity and reducing risk to affected organizations. Exploit Strike does not access, misuse, or retain exposed credentials, nor does it attempt unauthorized access to systems.
Any notifications made to vendors or impacted parties are based on publicly accessible information or information provided voluntarily by authorized stakeholders. Exploit Strike makes no warranties regarding the completeness or accuracy of third-party remediation efforts and assumes no liability for actions taken by vendors or impacted organizations in response to notifications.
This disclosure process is intended to support responsible remediation and does not constitute legal, regulatory, or compliance advice.
Why would Exploit Strike notify all impacted parties directly?
If remediation status remains unclear or unconfirmed after 30–60 days of contacting the third party vendor, Exploit Strike may notify impacted parties directly. This step is taken to ensure organizations, particularly regulated entities, have the opportunity to assess and mitigate potential risk within their own environments.
Tell me more about Exploit Strike?
We’re a dedicated team of cybersecurity engineers committed to protecting your organization by bringing together the discipline and integrity of Marine Corp military experience with the innovation of academic creativity and ingenuity. Here’s some more benefits of working with a small cybersecurity business.
Reach out today to schedule a discovery or scoping call.