Cybersecurity Consultancy

Find Your
Weaknesses
Before Attackers Do

EiferOne is a cybersecurity consultancy specialising in penetration testing, security audits, and compliance consulting for businesses that take security seriously.

Gain compliance-ready evidence for SOC 2, ISO 27001, GDPR, and PCI-DSS
Launch new apps and infrastructure with confidence, not guesswork
6-month post-audit monitoring included — not a bolt-on extra
150+
Assessments Completed
98%
Client Satisfaction
24hr
Initial Response Time
Acknowledged by leading organisations worldwide for vulnerability reporting
Organisation 1 Organisation 2 Organisation 3 Organisation 4 Organisation 5 Organisation 6 Organisation 7 Organisation 8 Organisation 9 Organisation 10 Organisation 11 Organisation 12 Organisation 13 Organisation 14 Organisation 15 Organisation 16 Organisation 17 Organisation 18 Organisation 19 Organisation 20

A Consultancy
Built on Expertise

EiferOne Ltd is a cybersecurity consultancy founded to give businesses access to the same calibre of security testing that enterprise organisations rely on — at a price point that works for growing companies.

We don't run automated scanners and call it a test. Every engagement is led by experienced security professionals who write reports you can actually act on — with clear remediation steps, business context, and compliance mapping.

Our team has conducted assessments across finance, healthcare, technology, and e-commerce sectors, working against OWASP Top 10, ISO 27001, Cyber Essentials, NIST, and PCI-DSS.

// Central Value Proposition
6-Month Post-Audit Monitoring — Included as Standard

Most consultancies hand you a PDF and disappear. EiferOne stays engaged for six months after every audit — tracking your remediation progress, flagging newly disclosed CVEs relevant to your stack, and re-testing patched findings at no extra cost. It's the ongoing assurance that turns a point-in-time test into a continuous security programme.

Founded
2024
Response
24hr
Guaranteed reply
Frameworks
10+
OWASP · ISO · NIST
Free Offer
Website
Overview
No obligations · 24hr delivery

Our Security Services

From rapid vulnerability assessments to comprehensive red team engagements — click any service to see exactly what's included and why it matters for your business.

Our Work

Anonymised engagements showcasing the types of vulnerabilities we've uncovered and remediated for clients across finance, healthcare, and technology.

Web App Penetration TestingCritical

SQL Injection in Financial Portal

Discovered unauthenticated SQL injection in a fintech customer portal, allowing full database extraction including encrypted card data. Remediation and re-test delivered within 5 days.

Sector: FinanceDuration: 5 daysFindings: 14
Case study — anonymised for client confidentiality
Network Vulnerability AssessmentHigh

Unpatched Internal SMB Exposure

Internal network assessment revealed unpatched EternalBlue-vulnerable machines on clinical networks, with lateral movement paths to patient record systems.

Sector: HealthcareDuration: 3 daysFindings: 9
Case study — anonymised for client confidentiality
Compliance Gap AnalysisMedium

ISO 27001 Gap Analysis — SaaS Startup

Pre-certification audit for a Series A SaaS company identified 23 control gaps. Client achieved ISO 27001 certification within 4 months of our roadmap delivery.

Sector: TechnologyDuration: 7 daysFindings: 23
Case study — anonymised for client confidentiality

What an Audit Looks Like

A prototype of the detailed, actionable reports you receive after every EiferOne engagement. Click any section in the navigation to explore the full report structure.

eiferone_report_Client_A_WebApp_2025.pdf — EiferOne Security Assessment
Risk Score: 61 / 100  ·  Critical: 3  ·  High: 1  ·  Medium: 8  ·  Low: 3
3
Critical
1
High
8
Medium
3
Low
Executive Summary

EiferOne conducted a black-box web application penetration test against Client A's primary customer portal between 12–16 May 2025. The engagement identified 15 vulnerabilities across four severity levels, including three critical findings that would allow an unauthenticated attacker to extract the full customer database and bypass all authentication controls.

The most significant risk to the organisation is the combination of SQL injection vulnerabilities and a complete lack of server-side authorisation checks — both of which are exploitable without any credentials. Immediate remediation of findings EF-001 through EF-004 is strongly recommended before the application is considered fit for production traffic.

The application's WAF (Cloudflare) is effectively bypassed due to origin IP exposure, meaning none of the perimeter security controls are providing meaningful protection in the current configuration.

Client
Client A (anonymised)
Test Type
Black-box Web App Pentest
Duration
5 days
Report Date
19 May 2025
Scope & Methodology

Testing was conducted against the URLs and IP ranges listed below, strictly within the agreed testing window of 09:00–18:00 BST. No production data was modified or exfiltrated during the engagement. All exploitation was performed against a staging environment mirroring production.

AssetTypeEnvironmentStatus
app.clienta.comWeb ApplicationStagingIn Scope
api.clienta.comREST APIStagingIn Scope
admin.clienta.comAdmin PanelProductionRead-Only
*.clienta-internal.comInternal NetworkOut of Scope
Testing Methodology

This engagement followed the OWASP Web Security Testing Guide (WSTG v4.2) and findings are scored using the CVSSv3.1 scoring system. Testing phases:

01
Reconnaissance — Passive and active information gathering, technology fingerprinting, DNS enumeration, SSL/TLS analysis.
02
Mapping — Full application crawl, endpoint discovery, authentication flow mapping, user role identification.
03
Exploitation — Manual testing of all OWASP Top 10 categories, business logic abuse, authentication bypass, injection testing.
04
Reporting — CVSSv3.1 scoring, PoC documentation, business impact assessment, remediation roadmap.
Critical Findings
EF-001 — Time-Based Blind SQL Injection (cargaPost.php)CRITICAL · CVSSv3: 9.8
The cargaPost.php endpoint fails to sanitise user-supplied input before passing it to backend SQL queries. Injecting a SLEEP(5) payload produced a confirmed ~6 second response delay, proving server-side SQL execution.
# Proof of Concept (sanitised)
POST /cargaPost.php → payload: 1' AND SLEEP(5)--
↳ Server response delayed ~6.0 seconds (confirmed execution)
↳ Remediation: Parameterised queries / prepared statements (PDO or MySQLi)
EF-002 — Tautology SQL Injection & Mass Data ExfiltrationCRITICAL · CVSSv3: 9.8
The palabrasClave POST parameter accepts unsanitised input. Injecting ' OR '1'='1 forced a tautology, returning the full database recordset in a single XML response.
POST /backend/xpos/php/ajax/buscaExpositores.php
palabrasClave=' OR '1'='1 → Full recordset returned in XML
↳ UNION SELECT confirmed — table enumeration possible
↳ Remediation: Prepared statements, WAF rules, full code audit
EF-003 — Broken Access Control / IDOR & PII ExposureCRITICAL · CVSSv3: 9.1
Sequential id parameter accepted with no authorisation check. Iterating the ID returns full user profiles including emails, phone numbers, and password hashes without authentication.
GET /backend/xpos/php/ajax/cargaExpositor.php?id=1
↳ Full profile returned: email, phone, password hash
↳ All records accessible — no authentication required
↳ Remediation: Server-side authorisation checks on all object references
High Findings
EF-004 — WAF Bypass via Origin IP ExposureHIGH · CVSSv3: 7.5
Origin server directly reachable via public IP, bypassing Cloudflare WAF, DDoS protection, and rate limiting entirely. Any attacker who resolves the origin IP can interact directly with the application, defeating all perimeter controls.
↳ Origin IP responds normally to direct HTTP requests
↳ Cloudflare security headers absent in direct response
↳ Remediation: Restrict inbound traffic to Cloudflare IP ranges only (via firewall ACL)
Medium Findings
EF-005 — Virtual Host Routing BypassMEDIUM · CVSSv3: 5.3
Manipulating the Host header in requests causes the application to route traffic to unintended internal virtual hosts, potentially exposing staging or admin interfaces not intended to be publicly reachable.
GET / HTTP/1.1
Host: internal-admin.clienta.local
↳ Internal admin panel returned (200 OK)
↳ Remediation: Strict vhost matching; reject unknown Host headers with 444
EF-006 — Missing Security Headers (CSP, HSTS, X-Frame-Options)MEDIUM · CVSSv3: 5.1
The application does not set a Content Security Policy, HSTS header, or X-Frame-Options. This leaves users vulnerable to clickjacking, protocol downgrade attacks, and cross-site scripting amplification.
HTTP/1.1 200 OK
↳ Content-Security-Policy: MISSING
↳ Strict-Transport-Security: MISSING
↳ Remediation: Implement headers via server config or middleware (see OWASP Secure Headers)
6 further medium findings included in the full report — covering session management weaknesses, information disclosure via error messages, and outdated third-party dependencies.
Low & Informational Findings
EF-013 — Server Version Disclosure via HTTP HeadersLOW · CVSSv3: 2.7
The Server and X-Powered-By response headers disclose the exact web server version and backend framework. While not directly exploitable, this reduces the effort required for targeted attack planning.
Server: Apache/2.4.51 (Ubuntu)
X-Powered-By: PHP/7.4.3
↳ Remediation: Set ServerTokens Prod in Apache config; unset X-Powered-By in PHP
EF-014 — Verbose Error Messages Exposing Stack TracesLOW · CVSSv3: 2.4
Triggering application errors returns full PHP stack traces in the HTTP response body, including file paths, function names, and database query fragments. This aids an attacker in understanding the application's internal structure.
↳ Fatal error: Uncaught PDOException in /var/www/html/backend/db.php:47
↳ Remediation: Set display_errors = Off in php.ini; log errors server-side only
EF-015 — Absence of robots.txt Disallow Rules for Sensitive PathsINFO
The robots.txt file does not restrict access to backend or admin paths, making them trivially discoverable via search engine indexing or automated crawlers. While not a vulnerability, it increases passive attack surface.
↳ /backend/, /admin/, /api/ not listed in Disallow
↳ Remediation: Add Disallow rules for all non-public paths; consider noindex meta tags
Remediation Plan

Findings are prioritised by CVSSv3 score and estimated remediation effort. We recommend addressing all Critical and High findings within 72 hours of report receipt. Medium findings should be scheduled for the next release cycle.

IDSeverityEffortPriority
EF-001CriticalLow — 2hrsImmediate
EF-002CriticalLow — 2hrsImmediate
EF-003CriticalMedium — 1 dayImmediate
EF-004HighLow — 1hrWithin 72hrs
EF-005 to EF-012MediumVariesNext Sprint
EF-013 to EF-015Low / InfoLowBacklog
Developer Guidance — EF-001 & EF-002

Both SQL injection findings share the same root cause: string concatenation in database queries. Replace all instances with parameterised prepared statements:

// ❌ VULNERABLE — string concatenation
$query = "SELECT * FROM users WHERE id = " . $_POST['id'];
 
// ✓ FIXED — parameterised prepared statement (PDO)
$stmt = $pdo->prepare("SELECT * FROM users WHERE id = ?");
$stmt->execute([$_POST['id']]);
Re-test Results

EiferOne conducted a free re-test on 28 May 2025 (9 days after report delivery) to verify remediation of all Critical and High findings. Results below.

FindingOriginalRe-test DateStatus
EF-001 — Blind SQLiCritical28 May 2025✓ Resolved
EF-002 — Tautology SQLiCritical28 May 2025✓ Resolved
EF-003 — IDOR / PIICritical28 May 2025✓ Resolved
EF-004 — WAF BypassHigh28 May 2025⚠ Partial
EF-005 to EF-015Med/LowPendingIn Progress

EF-004 partial note: Cloudflare origin IP restriction was applied to port 443 only. Port 80 (HTTP) still responds directly. Client has been notified — full resolution expected within 24 hours. A final re-test confirmation will be issued at no additional charge.

Appendices

The following supporting materials are included in the full report PDF delivered to the client. Contact EiferOne to request a full sample report.

A
Appendix A — CVSSv3.1 Scoring Breakdown
Full vector string and component scores for every finding (AV, AC, PR, UI, S, C, I, A).
B
Appendix B — OWASP WSTG Mapping
Each finding mapped to the relevant OWASP test case (e.g. WSTG-INPV-05 for SQL Injection).
C
Appendix C — Full HTTP Request/Response Logs
Sanitised raw request and response captures for all exploited findings.
D
Appendix D — Tool Output
Raw scanner output from Burp Suite Pro, Nmap, and nuclei — included for developer reference.
E
Appendix E — Tester Declaration & Rules of Engagement
Signed authorisation, safe exploitation boundaries, and testing window confirmation.

// Want the full 40-page report? Contact us and we'll send a complete sample PDF — no obligations.

Scope of Testing

Security is not a commodity. A flat-rate price tag often means rushed, automated scans. At EiferOne, we price every engagement based on the actual complexity and attack surface of your architecture — so you pay for what you need, and nothing you don't.

Asset Discovery
The "What"

We define the boundaries of the engagement — what is in scope and, critically, what is explicitly out of scope. This protects you legally and ensures efficient use of testing time.

  • Total web applications or FQDNs in scope
  • Number of dynamic API endpoints (REST / GraphQL)
  • IP ranges or cloud infrastructure perimeters
Complexity Analysis
The "Depth"

The technology stack dictates the time required for deep, manual testing. Automated tools miss business logic flaws — experienced testers don't.

  • Tech stack: containerised, Node.js, legacy, microservices
  • User roles: every privilege level requires separate testing
  • Dynamic content complexity vs static site assessment
Rules of Engagement
The "How"

We establish a safe testing environment, agree liability boundaries, and document safe exploitation parameters — standard concerns for any CTO engaging an external security team.

  • Environment: Production, Staging, or UAT (Staging recommended)
  • Testing windows: business hours or out-of-hours only
  • Safe exploitation thresholds — what we will and won't execute
Fixed-Price Proposal
The "Cost"

Once we understand your architecture, we produce a transparent, fixed-price Statement of Work with a guaranteed timeline. No hidden fees. No scope creep. No surprises on invoice day.

  • Fixed price — agreed before work begins
  • Guaranteed timeline in the Statement of Work
  • No day-rate overruns or ambiguous billing

Get a Transparent, Fixed-Price Quote

Fill in the form below — the more detail you provide, the more accurate your quote will be. We respond within 24 hours with a clear scope document and fixed price. No sales calls, no obligations.

// Fixed-price quote within 24 hours · No commitment required

Complexity-Based Pricing

Security cannot be commoditised into a shopping cart. These tiers show you the floor — final pricing is scoped to your actual architecture, endpoints, and user roles. Every engagement includes a detailed findings report, compliance mapping, and free re-testing.

All prices shown are starting points. A "web application" could be a three-page brochure site or a containerised Node.js platform with hundreds of API endpoints and complex role hierarchies. We scope every engagement individually so you pay for what your architecture actually requires — not a flat rate that penalises simple projects or loses money on complex ones.

Essential Audit
£499
// Starting at — scope determines final price
Ideal for: Static sites, simple marketing pages, or low-risk internal tools with limited dynamic functionality.
  • Automated vulnerability scanning (DAST — ZAP / AppScan)
  • Manual validation of critical OWASP Top 10 (XSS, SQLi, IDOR)
  • Public infrastructure footprinting
  • Standard remediation report with severity ratings
  • 1 free re-test for patched findings (30 days)
  • Advanced manual exploitation
  • Business logic & role-based testing
  • Compliance framework mapping
Request Scope →
Enterprise & Compliance
Custom
// Fixed quote after scoping call
Ideal for: Organisations requiring strict NCA ECC / NIST alignment, continuous testing, or red team engagements.
  • Full-scope infrastructure and cloud architecture review
  • Red team / social engineering simulation
  • NCA ECC / NIST CSF gap analysis and compliance mapping
  • ISO 27001 / SOC 2 / PCI-DSS certification support
  • Continuous 6-month post-audit monitoring
  • Dedicated assessment team
  • On-site engagement available
  • Ongoing retainer option
Talk to Lead Auditor →

How We Scope Your Engagement

The £499 and £1,499 figures are the floor, not the ceiling. Final pricing is always fixed and agreed in writing before work begins — based on three factors:

// Factor 01
Dynamic API Endpoints

A static 10-page site takes a fraction of the time to assess compared to a platform with 200 authenticated API endpoints. The more dynamic surface area, the deeper and longer the engagement needs to be.

// Factor 02
User Roles & Privilege Levels

Business logic flaws and authorisation bypass vulnerabilities require testing every distinct privilege level — unauthenticated, standard user, admin, super-admin. More roles means more test cases and more time.

// Factor 03
Overall Architecture Complexity

A containerised microservices environment, a legacy monolith, and a modern Next.js SaaS platform are not the same job. Tech stack, deployment model, and third-party integrations all affect scope depth.

Not sure which tier fits? Use the scope request form above — give us your URLs, rough endpoint count, and number of user roles, and we'll come back with a fixed-price quote within 24 hours. No obligations.

Request Scope →

Frequently Asked Questions

Penetration testing is a simulated cyberattack by security professionals to find exploitable vulnerabilities before real attackers can. It is required evidence for Cyber Essentials Plus, ISO 27001, SOC 2, and PCI-DSS compliance, and is increasingly expected by enterprise customers and cyber insurers as a condition of doing business.

Before any engagement begins, we agree a formal Statement of Work that defines exactly what we are authorised to test, what we will not attempt, and what constitutes a safe exploitation threshold (for example, we prove SQL injection exists without dumping live customer data). All testing is bounded by written, signed Rules of Engagement — protecting you legally and ensuring zero unplanned disruption to your services.

Yes. EiferOne Ltd carries professional indemnity and cyber liability insurance. Certificates of insurance are available on request prior to engagement. If your procurement team or legal counsel require specific coverage limits, please raise this during scoping and we will accommodate where possible.

A focused web application test takes 3–5 business days. A full infrastructure assessment or ISO 27001 gap analysis typically takes 5–10 business days. We provide a fixed, guaranteed timeline in the Statement of Work before any work begins — you will never receive a surprise mid-engagement scope extension.

The free overview covers SSL/TLS configuration, HTTP security headers, technology stack fingerprinting, DNS configuration checks, and obvious surface-level misconfigurations. Delivered within 24 hours, completely free, with no commitment required. It gives you an honest baseline before deciding whether a full engagement is right for you.

In the vast majority of cases, no. We use targeted, controlled techniques and agree safe exploitation boundaries upfront. Out-of-hours testing windows are available for production environments or sensitive infrastructure where any risk of impact is unacceptable. We strongly recommend staging environments for the most aggressive testing phases.

We test against and map findings to: OWASP Top 10, OWASP API Top 10, OWASP WSTG, NIST CSF, CIS Benchmarks, ISO/IEC 27001, Cyber Essentials and Cyber Essentials Plus, SOC 2, and PCI-DSS. If your target framework is not listed, ask us — we work across a broad range of international standards.

Absolutely. Our Essential Audit starting at £499 was designed specifically for SMEs and funded startups who need professional security testing without a large enterprise budget. Final pricing is scoped to your actual architecture — simple sites stay close to that floor. We give the same quality of work and report format regardless of engagement size.

Start Your Free Consultation

Let's Discuss Your Security

Whether you need a quick website overview or a comprehensive penetration test, we'll give you honest advice and a fixed quote — no pushy sales calls, no obligation.

Location
80 Kingsway North, Hollington
England & Wales, United Kingdom

// What You'll Receive

  • Free website security overview within 24 hours
  • Fixed-price quote — no hidden fees or day-rate overruns
  • Plain-English findings report with business context
  • Remediation guidance and developer consultation
  • Free re-test within 30–60 days of patching
  • 6-month post-audit monitoring on qualifying engagements
Request a Free Consultation
// We respond within 24 hours · No commitment required
Book a Discovery Call

30 minutes with our lead analyst — no sales pitch, just an honest look at your security posture and what makes sense for your architecture and budget.

30 minutes
Video or phone call
No commitment required