Macksofy Technologies
Annual + Quarterly · CERT-In Format Reports

Vulnerability Assessment + Penetration Testing.

VA finds the inventory of weaknesses; PT proves which ones an attacker can actually exploit. Macksofy delivers both as a single engagement, in the format Indian regulators expect.

ext.api
auth-svc
pay-gw
admin
core
s3-bucket
cdn
iam
live scan8 assets · 2 critical
  • 48h
    Quote SLA
  • 5–15 days
    Engagement
  • 30 days
    Free retest
  • CERT-In ready
    Format
The honest distinction

VA finds the inventory. PT proves the impact.

A scanner can list 800 vulnerabilities in a day; an attacker only needs one to matter. We do both — then the report only shows you what mattered.

Breadth · scanner-driven

Vulnerability Assessment

Findings raised0
Asset coverage0%
Manual effort per finding0 min
False positive rate0%

Tells you everything that might be wrong.

Depth · attacker-driven

Penetration Testing

Findings exploited0
Critical chains proved0
Manual effort per finding0 min
False positive rate0%

Tells you what an attacker would actually do.

Methodology

Six phases, every step documented.

Auto-advancing timeline of how a Macksofy VAPT engagement actually runs — pause, rewind or click any phase to drill in.

Phase 01
Day 1–2

Scoping & Pre-engagement

Mutual NDA · Rules of Engagement · Crown-jewel identification

Every Macksofy engagement begins with a tight scoping call. We agree on assets in/out of scope, define the Rules of Engagement, identify your crown jewels, and align on success metrics before a single packet leaves our infrastructure.

Key activities
  • Mutual NDA + authorization letter
  • Asset inventory + scope freeze
  • Crown-jewel and high-impact target identification
  • Communications and emergency-contact protocol
Tools / artifacts
Engagement LetterAuthorization DocRisk RegisterSlack/Teams bridge
Deliverable
Signed scope document + authorization letter
01 / 06
Coverage

Every asset class. Every test depth.

A VAPT scope is a 2D matrix: what we test (asset types) × how deep we test (authenticated, manual exploitation, chained). The grid shows what’s included in a Macksofy engagement.

Asset class \ Test depthAuthenticated scanUnauthenticated scanManual exploitationChain analysis
External perimeter
manual
manual
Internal network
scan
manual
manual
Web app + API
manual
manual
Mobile (iOS / Android)
manual
manual
Cloud (AWS / Azure / GCP)
scan
manual
manual
Containers / IaC
scan
manual
deep coverage scanner pass manual exploitation not applicable
Why exploitation matters

Low + low + low is how breaches actually start.

Scanners look at findings one at a time, and one at a time most of them really do look low. Attackers don’t read reports — they chain. Three innocuous misconfigurations stitched together is how an unauthenticated foothold quietly becomes domain admin. We show you that chain, not just the CVSS list.

Phase 01
Recon
OSINT, ASN/IP mapping, subdomain enumeration
Phase 02
Threat Modeling
Attack surface mapping + attacker profile
Phase 03
Exploitation
Manual + tooled (Burp, Metasploit, custom payloads)
Phase 04
Privilege Escalation
Linux / Win, AD abuse, kernel exploits
Phase 05
Lateral Movement
Pivoting, BloodHound paths, persistence
Phase 06
Reporting
Executive summary + dev-ready remediation
Regulator-format output

One engagement. Eight frameworks.

The VAPT deliverable doubles as evidence for whichever regulator is breathing down your neck this quarter.

CERT-In

Information security audit empanelled by Indian CERT

RBI CSF

RBI Cyber Security Framework + System Audit Reports

SEBI CSCRF

Cybersecurity & Cyber Resilience Framework for capital markets

ISO 27001

ISMS implementation, internal audit and certification support

PCI-DSS

Payment card industry — ASV scans, internal audit, pentest

GDPR

Article 32 controls, DPIA, data flow mapping

HIPAA

Healthcare data protection (relevant for India + UAE health-tech)

UAE NESA / SIA

UAE National Electronic Security Authority compliance

Anatomy of a finding

Every report card has eight axes.

CVSS isn’t enough — we attach business-impact, MITRE technique, exploit weaponisation status, fix-effort estimate and re-introduction likelihood to every High/Critical finding.

  • CVE/CWE pinning
  • MITRE ATT&CK technique mapping
  • Validated CVSS + business risk score
  • Reproduction script + screenshots
  • Remediation effort estimate
  • Verified-fix retest result
Critical · validated · weaponised

SSRF in image-proxy → AWS instance metadata exposure

The internal image-resize service accepts a user-controlled URL parameter, fetches it server-side, and returns the body. Pointing the URL at the EC2 metadata endpoint (169.254.169.254) returns IAM credentials with s3:*and kms:Decrypt permissions.

9.1
CVSS 3.1
9.1
CVE
CVE-2024-XXXXX
CWE
CWE-918 SSRF
MITRE
T1190 / T1552.005
$ proof-of-concept (curated)
curl 'https://target/img-proxy?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/web-role'
{"Code":"Success","AccessKeyId":"ASIA...","SecretAccessKey":"...","Token":"..."}
  • FoundDay 6 · authenticated scan + manual recon
  • ValidatedDay 7 · PoC executed in isolated tenant
  • ReportedDay 9 · CERT-In format · risk register updated
  • Re-testedDay 21 · fix verified · closure letter issued
Sample finding · anonymised from a 2025 BFSI engagementclosed · 14-day SLA
Tooling

Tools we trust. And tools we built ourselves.

Nessus, Qualys, Burp Pro, Nuclei, Trivy, Checkov — the same scanners every senior BFSI red team runs first, because they catch the obvious things quickly and free our operators to chase what really matters.

But scanners only see what they were taught to see. When ours hit something a commercial tool would miss — a chained CSP bypass, a quiet SSRF inside a JSON proxy, a serverless privesc path — we don’t shrug. We write the Burp extension, the Nuclei template, the Pacu module that catches it. On your engagement you get both: the tooling everyone else runs, and the bits we built ourselves.

Tools we operate
Nessus ProfessionalQualys VMDRBurp Suite ProAcunetixNucleiNiktoOWASP ZAPTrivy (containers)Checkov (IaC)Custom tooling
Deliverables

What lands in your inbox

  • VAPT report in CERT-In submission format
  • Risk register updates with CVSS + business risk score
  • Findings tracked by severity, asset, owner, ETA
  • Remediation guidance per CWE
  • Free retest within 30 days
  • Annual closure letter + Macksofy attestation
Industries

Sectors we operate in

BFSI · NBFC · Brokers · AMCsPayment AggregatorsHealthcareSaaSGovernment / PSUManufacturingEducation / EdTech
What clients say · Trusted India + UAE

Rated 4.9 ★ from 612 client reviews.

CERT-In Empanelled
Govt of India · MeitY
EC-Council ATC
Authorized Training
ISO 27001 Certified
Info Security Mgmt
We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.
AK
Aisha Khan
Information Security Manager · Listed Fintech · BKC, Mumbai
The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.
IK
Inspector K. Joshi
Cyber Cell · Maharashtra Police · Mumbai
Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.
VI
Vivek Iyer
DevSecOps Lead · Healthcare SaaS · Hyderabad
FAQ

Things people ask before signing.

Yes — Macksofy is CERT-In empanelled. Our reports are formatted for direct regulatory submission.
Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.