diff --git a/xml/source/snippets/offerte/en/aboutus.xml b/xml/source/snippets/offerte/en/aboutus.xml
index 6b079d1..ba43c1c 100644
--- a/xml/source/snippets/offerte/en/aboutus.xml
+++ b/xml/source/snippets/offerte/en/aboutus.xml
@@ -1,42 +1,69 @@
+ In contrast to other organizations, our profits do not benefit shareholders,
- investors, or founders. Our profits benefit society. As an
- organization without a profit-motive, we recruit top-name, ethical security
- experts and find like-minded customers that want to use their IT security
- budget as a "vote" to support socially responsible entrepreneurship. The rapid
- pace of our current growth reflects the positive response the market has to our
- idealistic philosophy and innovative business model. In contrast to other organizations, our profits do not benefit
+ shareholders, investors, or founders. Our profits benefit society. As an
+ organization without a profit-motive, we recruit top-name, ethical security
+ experts and find like-minded customers that want to use their IT security
+ budget as a "vote" to support socially responsible entrepreneurship. The
+ rapid pace of our current growth reflects the positive response the market
+ has to our idealistic philosophy and innovative business model.
+ For more information about
+ For more information about
-
- During the code audit portion of penetration tests, we take the following
- criteria into account:
+ During the code audit portion of penetration tests, we take the following
+ criteria into account:
- For more information, please refer to this link:
-
- https://www.owasp.org/index.php/OWASP_Code_Review_V2_Table_of_Contents
+ For more information, please refer to this link:
+
+ https://www.owasp.org/index.php/OWASP_Code_Review_V2_Table_of_Contents
+
- Crystal-Box vs. Black-Box pentesting refers to the amount of information
- about the target environment, architecture, and/or applications that the customer
- initially shares with the pentesters. With Black-Box testing, pentesters
- are given no information whatsoever about the target(s). With Crystal-Box testing,
- pentesters are given all information requested about the target(s), including
- source code (when relevant), access to developers or system management, etc..
-
+ Crystal-Box vs. Black-Box pentesting refers to the amount of information
+ about the target environment, architecture, and/or applications that the
+ customer initially shares with the pentesters. With Black-Box testing,
+ pentesters are given no information whatsoever about the target(s). With
+ Crystal-Box testing, pentesters are given all information requested about
+ the target(s), including source code (when relevant), access to developers
+ or system management, etc.
+ In this case In order to agree to this offer, please sign this letter in duplicate
- and return it to:
+
+ In order to agree to this offer, please sign this letter in duplicate and
+ return it to:
+
@@ -20,4 +20,4 @@
crystal-box pentesting fits naturally hand-in-hand with the "Peek Over Our
Shoulder" option that
-
-
- We don't build surveillance systems, hack activists, sell exploits to
- intelligence agencies, or anything of the sort. If a job is even remotely
- morally questionable, we simply won't do it.
- Releasing ALL tools and frameworks we build as open source on GitHub (a link to our GitHub page can be found on our website).
- During engagements, we will not only share our results with your company,
- but also provide a step-by-step description of how to perform the same
- audit or procedure without us. We want to demystify what we're doing.
- It's not rocket science, and we genuinely want to help your company
- improve its security posture, even if it costs us repeat business.
Releasing ALL collected threat intelligence
- (Indicators of Compromise) into an open-source database that everyone can freely use.
- (Sanitized in agreement with customers.)
- We don't sell zero-days - we responsibly disclose them!
+
+
+ We don't build surveillance systems, hack activists, sell exploits to
+ intelligence agencies, or anything of the sort. If a job is even remotely
+ morally questionable, we simply won't do it.
+
+ Releasing ALL tools and frameworks we build as open source on GitHub (a
+ link to our GitHub page can be found on our website).
+
+ During engagements, we will not only share our results with your company,
+ but also provide a step-by-step description of how to perform the same
+ audit or procedure without us. We want to demystify what we're doing. It's
+ not rocket science, and we genuinely want to help your company improve its
+ security posture, even if it costs us repeat business.
+
Releasing ALL collected threat intelligence (Indicators of
+ Compromise) into an open-source database that everyone can freely use.
+ (Sanitized in agreement with customers.)
+
+ We don't sell zero-days - we responsibly disclose them!
+
-
- In this step, we analyze the risks of a particular application or system.
- Threat Modeling is a specific, structured approach to risk analysis that
- enables us to identify, qualify, and address the security risks, thus
- dovetailing with the Code Review process. For example, user data is
- sacred. We focus on encrypted storage, discover if
+ In this step, we analyze the risks of a particular application or system.
+ Threat Modeling is a specific, structured approach to risk analysis that
+ enables us to identify, qualify, and address the security risks, thus
+ dovetailing with the Code Review process. For example, user data is
+ sacred. We focus on encrypted storage, discover if
- Here we focus on risks, especially in the quick and easy sharing of
- internal documents and itineraries. Account details aren't so secret
- when we know who will be in meetings, but what's being discussed is secret.
+
+ Here we focus on risks, especially in the quick and easy sharing of
+ internal documents and itineraries. Account details aren't so secret when
+ we know who will be in meetings, but what's being discussed is secret.
- The complexity of the system is in the frameworks that support the web
- application. We'd ignore those and focus only on the custom code and
- backend code. We would also
- focus on implementation mistakes and known flaws in the systems. For
- example, we'd ensure you're using the latest versions of software,
- but we wouldn't delve into the framework itself. Since we assume the
- code is written by a team, it should be clearly-written code. If you have
- several full-release versions, there will undoubtedly be several revisions
- and audits on that code.
+
+ The complexity of the system is in the frameworks that support the web
+ application. We'd ignore those and focus only on the custom code and
+ backend code. We would also focus on implementation mistakes and known
+ flaws in the systems. For example, we'd ensure you're using the latest
+ versions of software, but we wouldn't delve into the framework itself.
+ Since we assume the code is written by a team, it should be
+ clearly-written code. If you have several full-release versions, there
+ will undoubtedly be several revisions and audits on that code.
-
- In this case
Overdiemerweg 28
1111 PP Diemen
+
Overdiemerweg 28
1111 PP Diemen
+
-
(Full Client Name) (“(Client)”), with its registered
office at Somestreet, Somecity, Earth, Milkyway, and duly represented by
diff --git a/xml/source/snippets/offerte/en/grey-box.xml b/xml/source/snippets/offerte/en/grey-box.xml
index a73f17f..42722a9 100644
--- a/xml/source/snippets/offerte/en/grey-box.xml
+++ b/xml/source/snippets/offerte/en/grey-box.xml
@@ -2,13 +2,13 @@
- Crystal-Box vs. Black-Box pentesting refers to the amount of
- information regarding the target environment, architecture, and/or
- applications that is initially shared by the customer with the pentesters.
- With Black-Box testing, pentesters are given no information whatsoever about
- the target(s). With Crystal-Box testing, pentesters are given all
- information requested about the target(s), including source-code (when
- relevant), access to developers or system management, etc..
+ Crystal-Box vs. Black-Box pentesting refers to the amount of information
+ regarding the target environment, architecture, and/or applications that is
+ initially shared by the customer with the pentesters. With Black-Box
+ testing, pentesters are given no information whatsoever about the target(s).
+ With Crystal-Box testing, pentesters are given all information requested
+ about the target(s), including source-code (when relevant), access to
+ developers or system management, etc..
+
+ The motivation for this request is that This offer sets out the scope of the work and the terms and conditions under
- which This offer sets out the scope of the work and the terms and conditions
+ under which
The motivation for this request is that The motivation for this request is that This offer sets out the scope of the work and the terms and conditions
under which This requires an extensive knowledge of the platform the application is
running on, as well as the extensive knowledge of the language the
application in written in and patterns that have been used. Therefore a code
audit done by highly-trained specialists with a strong background in
@@ -21,7 +21,7 @@
During the code audit, we take the following approach:
The aim of load testing is to measure what realistic level of performance a
service deployment is capable of delivering, or whether it meets a specific
diff --git a/xml/source/snippets/offerte/en/planningandpayment.xml b/xml/source/snippets/offerte/en/planningandpayment.xml
index 19b2d1b..3fc5918 100644
--- a/xml/source/snippets/offerte/en/planningandpayment.xml
+++ b/xml/source/snippets/offerte/en/planningandpayment.xml
@@ -1,10 +1,13 @@
+
Our fixed-fee price quote for the above described In order to perform this audit, In order to provide training,
The workflow of our penetration testing team is modeled on that of a
Capture The Flag (CTF) team:
-
+
- WHEREAS:
-
+ WHEREAS:
+ A. B. Some of the activities performed by
- C.
- DECLARES AS FOLLOWS:
- 1. 2. a. enter and use the Targets; b. circumvent, breach, remove and turn off
- any security measures protecting the Targets; c. copy, intercept, record, amend, delete,
- render unusable or inaccessible any data stored on, processed by or
- transferred via the Targets; and d. hinder the access or use of the
- Targets, but 3. The permission under Article 1 extends
- to all systems on which the Targets run, or which 4. 5. Should the public prosecutor initiate an
- investigation or criminal proceedings against A. B. Some of the activities performed by C.
+ DECLARES AS FOLLOWS:
+ 1. 2. a. enter and use the Targets; b. circumvent, breach, remove and turn off any security measures
+ protecting the Targets;
+ c. copy, intercept, record, amend, delete, render unusable or
+ inaccessible any data stored on, processed by or transferred via the
+ Targets; and
+ d. hinder the access or use of the Targets, but 3. The permission under Article 1 extends to all systems on which the
+ Targets run, or which 4. 5. Should the public prosecutor initiate an investigation or criminal
+ proceedings against
- Crystal-Box vs. Black-Box pentesting verwijst naar de hoeveelheid
- informatie over de doelwit omgeving, architectuur, en/of applicaties die de klant
- in eerste instantie deelt met de pentesters. Bij Black-Box testing ontvangen de
- pentester helemaal geen informatie over het doelwit. Bij Crystal-Box tests
- ontvangen de pentesters alle informatie die opgevraagd wordt betreffende het doelwit,
- inclusief source code (wanneer dit relevant is), toegang tot developers of systeembeheer, etc...
-
-
+ Crystal-Box vs. Black-Box pentesting verwijst naar de hoeveelheid informatie
+ over de doelwit omgeving, architectuur, en/of applicaties die de klant in
+ eerste instantie deelt met de pentesters. Bij Black-Box testing ontvangen de
+ pentester helemaal geen informatie over het doelwit. Bij Crystal-Box tests
+ ontvangen de pentesters alle informatie die opgevraagd wordt betreffende het
+ doelwit, inclusief source code (wanneer dit relevant is), toegang tot
+ developers of systeembeheer, etc...
+
+
- This requires an extensive knowledge of the platform the application is
+
-
We try to get a thorough comprehension of how the application works and
how it interacts with the user and other systems. Having detailed
@@ -29,7 +29,7 @@
documentation) at this stage is very helpful, as they aid the
understanding of the application
Using the understanding we gained in the previous step, we will use static
code analysis to uncover any vulnerabilities. Static analysis means the
@@ -47,7 +47,7 @@
assessing the quality of the security measures.
Dynamic analysis can also be performed. In this case, the program is run
and actively exploited by the specialist. This is usually done to confirm
diff --git a/xml/source/snippets/offerte/en/methodology_load-test.xml b/xml/source/snippets/offerte/en/methodology_load-test.xml
index a4e325f..109b8f7 100644
--- a/xml/source/snippets/offerte/en/methodology_load-test.xml
+++ b/xml/source/snippets/offerte/en/methodology_load-test.xml
@@ -1,6 +1,5 @@
-