TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Best practices for purchasing a Pen Test?

7 pointsby justinram11almost 2 years ago
Hello,<p>I&#x27;m currently the Tech Lead &#x2F; CTO at a small 20-person startup that has seen quite a bit of growth this year.<p>We store quite a bit of contact information (names, phone numbers, email addresses), and have quite a few &lt;18 year old users (we are a high school fundraising platform). We&#x27;d like to make sure we are doing our best to keep that information protected.<p>I think our biggest concern at the moment is a data leak.<p>We would eventually like to move towards SOC2 (likely through Vanta), so I&#x27;m not sure if there is a way to &quot;kill 2 birds with one stone&quot; here.<p>I inherited this project from a contracting shop, and although I&#x27;m feeling fairly comfortable with it at this point, I&#x27;m very much in a &quot;I don&#x27;t know what I don&#x27;t know&quot; situation.<p>Any specific recommendations for things to look for or things to avoid? Are most companies the same in that they&#x27;re just going to run a set of automated scripts against your services?<p>Thanks for any help!

2 comments

jjicealmost 2 years ago
I can only speak to a very specific example that I setup and ran at my last job for a SOC 2 annual pen test. We used a service called Cobalt Core (not affiliated), but they&#x27;re kind of like UpWork for pen testers.<p>Aside from that, I&#x27;d imagine the general process is very similar. You define your parameters on what they&#x27;re looking for, where to look for it, and what not to do. First thing I&#x27;d say is to make sure you have an isolated staging environment for them that they can attack without you disturbing them or them disturbing you.<p>If there are any parts of your code base that you&#x27;re specifically concerned about, ask them to focus there! The goal of a pentest is to find what&#x27;s broken (which it seems you&#x27;re already on board with). An old CEO of mine wanted us to pass the pentest, not actually gain value from it... Take advantage of the fact they have people who know more than you and I (hopefully) to try and compromise the application.<p>They should give a nice write up with details on what they found and I&#x27;ve had a good experience asking them questions about solutions and future prevention.<p>I&#x27;m sure quality varies, but I wouldn&#x27;t be surprised if the majority of what gets done for the average pentest are the same list of scripts that try to abuse Django admin and such, so I can&#x27;t really speak to other qualities. Lots of injection focused attacks, but can&#x27;t hurt for them to try.
ericalexander0almost 2 years ago
You&#x27;re better off doing a private bug bounty through bug crowd or hackerone.<p>Pentests are point in time assessments. Usually with one to two testers, with limited scopes of expertise.<p>Bug bounties can bring in hundreds of testers with a wide breadth of expertise that continuously test.
评论 #37136122 未加载
评论 #37135537 未加载