Real Manual Penetration Testing
Meet your Halo Hacker.
Whether you’re looking to complete your first pentest, or just looking for a fresh set of eyes, our friendly & experienced penetration testers are here to help.
Get a Quote
Testing Types
-
Application Pentests
Identify business logic and coding flaws within your custom-built applications.
-
Compliance Pentests
Penetration testing specifically designed to comply with PCI DSS Requirement 11.3.
-
Network Pentests
Discover network weaknesses often based on vulnerability chaining techniques.
-
Mobile App Pentests
Find app security issues in iOS and Android applications.
How We Help
- Get a comprehensive third-party penetration test
- Discover & remediate security issues that automation alone can’t find
- Meet (and exceed) your compliance requirements & customer demands
- Protect your business from the fallout of a data breach
- Gain the attacker's view of your organization
Why Halo Security?
- 100% US-Based Staff
- 11+ Years in Business
- 2,000+ Clients Served
- 98%+ Support Satisfaction
A Few Of Our Customers
We might not be the right fit if:
- You’re primary focus is on physical security, Wi-Fi, or social engineering.
- You don’t have staff that can fix vulnerabilities and issues.
- You like to work with jerks.
- You just want an automated scan. (If this is the case, check out our comprehensive suite of automated solutions.)
Consider Halo Security if:
- You’re focused on securing websites, web applications, and external networks.
- You have a developer or system administrator who can remediate issues we find (with our help).
- You prefer working directly with people are knowledgeable, transparent, and friendly.
- You want a real human to test your assets.
An open letter from our CEO
I know that finding the right pentesting partner can be challenging. Many providers obscure what’s really being tested, making it difficult to distinguish between automated scanning and genuine, thorough evaluations.
From my career in project management, I've learned the importance of reliability, great service, and helping clients navigate complex challenges. These principles are the foundation of our approach at Halo Security.
Of course, every pentester we hire is well-versed and experienced in cybersecurity needs and complex compliance requirements. But they are also friendly, helpful, and reliable. We always offer direct access to our pentesters from the very first scoping call. And if we’re not the right fit, we’ll let you know and refer you to someone who is, because your security is our top priority.
Operating fully within the United States, Halo Security has earned the trust of thousands of organizations since our founding in 2013. Our approach goes beyond identifying vulnerabilities; it’s about building a relationship based on trust, transparency, and reliability.
Thank you for considering Halo Security to assist you in your security journey. Even if you decide on a different partner, I’m confident you'll enjoy meeting the members of our team.
Sincerely,

CEO
FAQs
What types of pentests do you offer?
We offer a variety of penetration testing services to meet different security needs:
Websites and Web Applications:
We test for vulnerabilities in your websites and web applications, ensuring they are secure against common and advanced threats. This includes identifying issues like SQL injection, cross-site scripting (XSS), authentication flaws, and more.
External Networks:
Our external network penetration testing focuses on assessing the security of your network's perimeter. We identify and exploit vulnerabilities that could be accessed by attackers from outside your network, ensuring your defenses are robust.
PCI Compliance Tests:
We conduct penetration testing in accordance with the Payment Card Industry Data Security Standard (PCI DSS) requirements. This includes evaluating the security of your Cardholder Data Environment (CDE) to ensure compliance with PCI DSS and protect sensitive cardholder data.
What does a pentest scoping entail?
Penetration test scoping is a crucial initial step in our process. We begin by meeting with you to understand your specific needs, the scope of the project, and your overall security objectives. During this meeting, we'll ask a few simple yet important questions to gather necessary information about your systems, applications, and network environment. Using this information, we determine the amount of time needed to conduct a thorough and effective penetration test. Based on our assessment, we then provide a fixed-price quote for our services, ensuring transparency and allowing you to budget effectively for the security assessment.
Can I see a sample report?
Of course, you can download a sample report here.
How much does a pentest cost?
The cost of a penetration test varies based on the size and complexity of the project. A penetration test for a simple application or small network generally starts at $4,975. For more complex applications with many user roles or features, or larger networks, we'll provide a fixed-price quote after an initial scoping call to ensure we thoroughly understand your needs and the scope of the testing required.
Who are the pentesters?
Our assessments are performed by experienced US-based security professionals who conduct remote investigations, review documentation, and contribute to the presentation of findings in the report.
What deliverables come with a penetration test?
All penetration tests come with two primary deliverables:
Penetration Testing Report:
A comprehensive report detailing the findings of the test. This report outlines identified vulnerabilities, their potential impact, and recommendations for remediation. It serves as a valuable resource for your team to address any security gaps.
Attestation Letter:
A letter describing the test and its scope. This attestation letter is perfect for fulfilling client requirements and demonstrating that a professional security assessment has been conducted on your systems.
Can you help with SOC2, HIPAA, or GDPR?
Yes, our penetration tests can be used to help fulfill compliance requirements for many of the major regulatory frameworks and standards, including SOC2, HIPAA, or GDPR. Our thorough assessments and comprehensive reports provide the necessary documentation and insights to support your compliance efforts.
What do you test for?
Our testing methodology adheres to audit procedures and established criteria, ensuring consistency and compliance with industry standards, including the Payment Card Industry (PCI) Data Security Standard requirement 11.3. Our examination follows information system security assessment best practices outlined by the Open Source Security Testing Methodology Manual (“OSSTMM”) and The National Institute of Standards and Technology (“NIST”) Special Publication 800-42, Guideline on Network Security Testing.
Web application penetration tests cover OWASP security threats, including:
- SQL Injection
- Authentication Flaws
- Directory Traversal
- OS Command Injection
- Business Logic Vulnerabilities
- Information Disclosure
- Access Control Vulnerabilities
- Server-Side Request Forgery (SSRF)
- XML External Entity (XXE) Injection
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Cross-Origin Resource Sharing (CORS)
- Clickjacking
- DOM-Based Vulnerabilities
- WebSockets Vulnerabilities
- Insecure Deserialization
- Server-Side Template Injection (SSTI)
- Web Cache Poisoning
- HTTP Host Header Attacks
- HTTP Request Smuggling
- OAuth Authentication
How long does a pentest take?
The duration of a penetration test depends on the size and complexity of the project. Typically, reports are delivered within 2-4 weeks.
Is retesting included?
Yes, one round of retesting is included with our penetration tests. After we provide the initial report and your team addresses the vulnerabilities found, we conduct a retest to ensure that the remediation actions have been successfully implemented. We then provide you with an updated report reflecting the current security status of your systems.

Let's chat.
Our friendly hackers are here to answer your questions and help you protect your organization.
A trusted advisor since 2013.
Halo Security was founded by veterans of industry leaders like Intel and McAfee who set out on a mission to help organizations understand and reduce digital risk. In 2002, they created one of the world’s first commercial website and web application vulnerability scanners. Halo Security now offers a complete line of products and services that help organizations protect the attack surface and build trust online.