At LOGIQUE, we deliver high-quality penetration testing services performed entirely by our in-house security engineers. With internationally certified testers (e.g., OSCP), your sensitive data remains safe — no outsourcing involved. We don’t just identify vulnerabilities; we also offer optional support for remediation. Enterprise-grade testing at affordable rates. Trusted by leading organizations in Indonesia and beyond.
LOGIQUE is not a general IT security vendor. We specialize in penetration testing. All testing is conducted by our in-house OSCP+ certified professionals — no outsourcing. We simulate real-world attacks to identify hidden vulnerabilities before attackers do.
Every organization has unique digital assets and risk factors. We provide customized pentest strategies, aligned with your infrastructure and business logic. This ensures practical, relevant, and actionable results.
Unlike many providers, LOGIQUE doesn’t stop at identifying issues. Our expert developers can assist in fixing vulnerabilities (upon request), and we deliver detailed reports to help you take the next step toward securing your digital assets.
Our penetration tests are conducted by in-house experts certified with OSCP, CEH, CPENT, and more. Unlike many vendors, we don’t outsource — ensuring high-quality results and maximum confidentiality for your sensitive systems.
LOGIQUE offers world-class quality at accessible pricing. Starting from as low as 30 million IDR per system, our services help companies of all sizes get the protection they need — without breaking the bank.
We deliver results quickly, with clear, actionable reports. Our process is efficient and optimized to meet urgent needs without sacrificing quality.
An IT system or web application typically contains various important data, making data leakage highly undesirable. LOGIQUE’s penetration testing services help address this risk: our IT security experts will define the scope of testing and conduct a comprehensive assessment. If remediation is required, LOGIQUE can also connect you with a qualified IT development partner.
Input/Output Testing
Validation of user input, both on the client side and the server side, is essential to prevent attacks such as injection or malicious scripts. On the other hand, the application's output must also be properly handled to prevent exploitation such as XSS or injection
Authentication & Login Error Handling
Verifies login procedures, secure handling of login credentials, and user feedback messages.
Access Control & Role-Based Issues
Checks for privilege escalation and unauthorized access to restricted resources or features.
Session Management
Evaluates session fixation vulnerabilities and CSRF (Cross-Site Request Forgery) risks.
Default Content & General Weaknesses
Detects leftover sample programs, open directories, and other default elements that could be exploited.
Mobile apps (Android/iOS) often handle sensitive personal or business data, making security vulnerabilities especially critical. LOGIQUE’s mobile application penetration testing service identifies hidden risks before attackers can exploit them. Our comprehensive assessments also cover interactions with web APIs to ensure overall app security.
E-Commerce Application
Improper Platform Usage
Testing for abuse of platform features or failure to enforce standard security controls.
Insecure Data Storage
Areas to be tested include SQL databases, log files, manifest files, binary data, cookie stores, SD cards, or synced cloud storage.
Insecure Communication
Review of request/response traffic to check for secure protocol usage.
Insecure Authentication
Testing hidden service requests or interface dependency issues related to broken authentication.
Insufficient Cryptography
Tests for cryptographic implementation flaws or weak encryption methods.
Insecure Authorization
Testing for authorization bypass via binary attacks or privilege escalation scenarios.
Client Code Quality / Client Side Injection
Review of mobile app client-side code quality and injection vulnerabilities.
Code Tampering
Testing for vulnerabilities that allow runtime code modification or manipulation of the execution environment.
Reverse Engineering
Final binary analysis to extract string tables, source code, libraries, algorithms, and embedded resources.
Infrastructure & Network Penetration Testing
This service is designed to identify potential vulnerabilities in your critical network infrastructure and prevent data breaches before they occur. Testing covers servers, routers, workstations, and cloud environments. Both on-site and remote (VPN-based) testing options are available.
IPV4/IPV6 Scanning & OSINT
Database Server Attacks
Container Breakout
Active Directory Exploitation
Linux Exploitation
Windows 10 Techniques
VPN, VOIP, VLAN Attacks
Cloud Infrastructure Hacking
Reports are easy to understand
Full support until retest
Testing performed by CEH certified specialists
Testing is done on site or remotely via VPN
Testing Server/Router/Workstation/Cloud
Server
Router
Workstation
Cloud
IPV4/IPV6 Scanning, OSINT
Hacking Database Servers
Container Breakout
Ad Exploitation
Linux Exploitation
Techniques (Win 10)
VPN Exploitation
VOIP Attack
VLAN Attacks
Cloud Hacking
Reports are easy to understand
Full support until retest
API testing
Comprehensive testing (Web App/Web System)
IOT App
Cloud Based System and Infrasstructure
Fleet Management System
Auction Management System
E-Commerce
Customer Relationship Management (CRM)
HRS
Sign-in/outbound test
Authentication tests
Login/ Problems related to roles
Session Management
Common vulnerabilities
Reports are easy to understand
Full support until retest
Testing performed by CEH certified specialists
API testing
Android & iOS
HR Application
E-Learning Application
PWA
E-Auction Application
Inspection Application
E-Commerce Application
Improper platform usage
Insecure data storage
Insecure communication
Insecure authorization
Client code quality/client side Injection
Code Tampering
Reverse Engineering
Extraneous Functionality
Pentesting gives you a clear picture of how secure your applications, websites, or networks are against cyberattacks. It helps identify and fix vulnerabilities before malicious actors can exploit them.
Cyber threats are a growing concern for any business operating in the digital space. According to a study by the University of Maryland, a hacking attack occurs every 39 seconds globally.
Don't wait until it's too late. Strengthen your digital security today.
LOGIQUE DIGITAL INDONESIA provides professional penetration testing services in Indonesia, conducted by experienced in-house pentesters holding certifications such as OSCP, CEH, and LPT. Our focus is on thoroughly identifying security gaps in your applications, websites, and IT infrastructure.
We follow globally recognized testing methodologies with a combination of automated tools and deep manual analysis, ensuring accurate findings and easy-to-understand technical reports.
When needed, our team is available for on-site testing, allowing security assessments to be conducted directly at your company’s premises.
To ensure an efficient and accurate security assessment, we offer three standard testing approaches:
A balanced method where testers have partial access (e.g. user credentials, API docs, system architecture).
Simulates external attacks without prior knowledge of the system. Recommended for clients with tight budgets.
Involves full access to source code. Suitable for high-risk systems that require deep code review.
As a trusted penetration testing vendor in Indonesia, LOGIQUE adheres to internationally recognized standards. Here are the five main steps:
Collecting target-related information via active and passive methods to understand the system architecture and plan the attack strategy.
Using technical tools to detect open ports, active services, and potential vulnerabilities.
Exploiting discovered vulnerabilities to gain initial access into the system, followed by controlled testing from within.
Ensuring continued access to observe the system’s behavior over time without being detected.
Removing logs and digital footprints to simulate a real-world stealth attack, ensuring authenticity of the test scenario.
Logika Sarana Teknologi has extensive experience in performing security assessments across various industries. We’ve conducted penetration testing for government websites, fintech firms, e-commerce platforms, automotive manufacturers, and more.
Throughout these engagements, our team has consistently identified security vulnerabilities that could compromise digital assets if not patched promptly.
Some common vulnerabilities we’ve discovered include:
We understand that not every company has an internal IT team ready to handle vulnerabilities discovered during penetration testing. If your current IT vendor cannot be relied upon, LOGIQUE offers optional remediation support as an additional service.
Our in-house software developers and DevOps professionals can step in to directly fix and address the security issues uncovered. What makes our service stand out is the tight collaboration between our security and development teams, ensuring that all vulnerabilities are remediated quickly and efficiently—with minimal disruption.
We don’t just point out the problems—we help solve them.
This optional service is subject to technical access and the type of vulnerability identified. Contact us for a consultation to determine how this service can benefit your organization.
LOGIQUE
CLIENT
LOGIQUE
CLIENT
LOGIQUE
CLIENT
LOGIQUE
CLIENT
LOGIQUE
CLIENT
LOGIQUE
CLIENT
| Time | Industry | Object of Assesment | Found Problems (Risk Level) | ||
|---|---|---|---|---|---|
| High | Middle | Low | |||
| Sep - Oct 2019 | Travel | Web app | 5 | 4 | 2 |
| Sep - Oct 2019 | Media | Online Media | 8 | 0 | 3 |
| Sep - Oct 2019 | Entrainment | Network infrastructure | 4 | 2 | 1 |
| Sep - Oct 2019 | E-commerce | Market Place Web | 8 | 4 | 4 |
| Oct 2019 | E-commerce | PWA | 4 | 3 | 0 |
| Oct - Nov 2019 | Forwarding | Website company profile | 5 | 5 | 3 |
| Oct - Nov 2019 | E-commerce | Web app | 6 | 0 | 2 |
| Oct - Nov 2019 | E-commerce | Web app | 2 | 2 | 1 |
| Oct - Dec 2019 | E-commerce | Web app | 53 | 1 | 0 |
| Nov - Dec 2019 | E-commerce | Mobile app for Android | 2 | 2 | 2 |
| Nov - Dec 2019 | E-commerce | E-commerce | 3 | 2 | 2 |
| Nov - Dec 2019 | E-commerce | E-commerce | 2 | 2 | 1 |
| Nov 2019 | Fintech | Web app | 1 | 2 | 3 |
| Nov 2019 | Fintech | Mobile app for IOS and Android | 2 | 4 | 2 |
| Dec 2019 | Finance | Corporate Web | 2 | 1 | 4 |
| Dec 2019 | Automotive | Corporate Web | 4 | 0 | 2 |
| Dec 2019 | Service | Member web | 3 | 4 | 3 |
| Time | Industry | Object of Assesment | Found Problems (Risk Level) | ||
|---|---|---|---|---|---|
| High | Middle | Low | |||
| Jan 2020 | Fintech | Web App | 0 | 2 | 0 |
| Jan 2020 | Fintech | Mobile App | 1 | 8 | 1 |
| Jan 2020 | Fintech | Network Infrastructure | 0 | 3 | 0 |
| Feb 2020 | Automotive | Network Infrastructure | 0 | 0 | 1 |
| Feb 2020 | Service | Web App | 0 | 4 | 1 |
| Feb 2020 | Mobilephone Provider | Web App | 1 | 10 | 2 |
| Mar 2020 | Airline | Web App | 0 | 4 | 1 |
| Mar 2020 | Financial Planner | Web App | 4 | 1 | 2 |
| Mar 2020 | Travel | Web App | 5 | 4 | 2 |
| Apr 2020 | Service | Network Infrastructure | 0 | 1 | 2 |
| Apr 2020 | Service | Web App | 0 | 1 | 3 |
| May 2020 | Insurance | Web App | 4 | 4 | 1 |
| May 2020 | Insurance | Network Infrastructure | 0 | 2 | 3 |
| Jun 2020 | Pharmacies | Web App | 0 | 2 | 0 |
| Jun 2020 | Fintech | Web App | 5 | 0 | 0 |
| Sep 2020 | Fintech | Web App | 0 | 4 | 2 |
| Oct 2020 | Agriculture | Network Infrastructure | 0 | 5 | 1 |
| Time | Industry | Object of Assesment | Found Problems (Risk Level) | ||
|---|---|---|---|---|---|
| High | Middle | Low | |||
| Jan 2021 | Automotive | Website | 1 | 2 | 0 |
| Jan 2021 | Financial | Corporate Web | 0 | 4 | 2 |
| Feb 2021 | Automotive | Internal Web System | 0 | 4 | 2 |
| Feb 2021 | Retail Business | Mobile App | 0 | 2 | 3 |
| Feb 2021 | E-Learning | Web App | 0 | 5 | 8 |
| Jun 2021 | Insurance | Web App | 0 | 4 | 4 |
| Sep 2021 | E-commerce | Web App | 3 | 2 | 8 |
| Sep 2021 | Public Institution | Web System | 1 | 0 | 5 |
| Oct 2021 | Research Company | Website | 2 | 1 | 3 |
| Nov 2021 | Food Porducer | Web App | 0 | 4 | 3 |
| Nov 2021 | Manufacture | Corporate Web | 0 | 3 | 4 |
| Time | Industry | Object of Assesment | Found Problems (Risk Level) | ||
|---|---|---|---|---|---|
| High | Middle | Low | |||
| Jan 2022 | Marketing Agency | Corporate Web | 0 | 2 | 1 |
| Jan 2022 | Online media | Web app | 2 | 2 | 3 |
| Jan 2022 | Medical Startup | Web App | 0 | 2 | 7 |
| Feb 2022 | Manufacture | Mobile App | 3 | 1 | 4 |
| Mar 2022 | Automotive | Service Web | 0 | 2 | 2 |
| Mar 2022 | Marketing Agency | Web App | 3 | 3 | 5 |
| Apr 2022 | Service | Mobile App | 1 | 2 | 4 |
| May 2022 | Sier | Corporate Web | 2 | 0 | 2 |
| Jun 2022 | Insurance | Mobile App | 1 | 2 | 4 |
| Jun 2022 | Fintech Startup | Mobile App | 1 | 5 | 3 |
| Jun 2022 | Food Manufacture | Web system | 1 | 2 | 1 |
| Jun 2022 | Public Institution | Web system | 2 | 4 | 4 |
| Jun 2022 | HR Agency | Web App | 0 | 4 | 4 |
| Jul 2022 | Automotive | Website | 0 | 3 | 3 |
| Jul 2022 | Retail | Website | 0 | 2 | 5 |
| Jul 2022 | Manufacturer | Network | 0 | 2 | 2 |
| Aug 2022 | Fintech Startup | Mobile App | 1 | 1 | 4 |
| Aug 2022 | Travel | Web App | 2 | 2 | 3 |
| Sep 2022 | E-Commerce | Web App | 4 | 1 | 4 |
| Sep 2022 | E-Commerce | Network Infrastructure | 2 | 1 | 1 |
| Oct 2022 | Online media | Web App | 1 | 4 | 1 |
| Oct 2022 | E-Commerce | Mobile App | 1 | 2 | 2 |
| Oct 2022 | Manufacturer | Network Infrastructure | 1 | 0 | 1 |
| Nov 2022 | Financial | Website | 0 | 2 | 2 |
| Nov 2022 | Medical | Website | 1 | 4 | 4 |
| Nov 2022 | Manufacturer | IT System | 6 | 8 | 12 |
| Dec 2022 | E-Commerce | Mobile App | 2 | 2 | 3 |
| Dec 2022 | IT Service | Website | 1 | 2 | 4 |
| Time | Industry | Object of Assesment | Found Problems (Risk Level) | ||
|---|---|---|---|---|---|
| High | Middle | Low | |||
| Jan 2023 | Financial | Website | 1 | 3 | 3 |
| Jan 2023 | Financial | API | 1 | 1 | 1 |
| Jan 2023 | Fintech Startup | Network Infrastructure | 0 | 2 | 2 |
| Jan 2023 | Insurance | Web App | 1 | 5 | 2 |
| Feb 2023 | Traiding | Network Infrastructure | 2 | 3 | 4 |
| Feb 2023 | Traiding | IT System | 8 | 17 | 10 |
| Feb 2023 | Food | Web App | 2 | 2 | 3 |
| Feb 2023 | Food | API | 1 | 1 | 4 |
| Feb 2023 | IT Service | Website | 1 | 4 | 1 |
| Mar 2023 | Service | Web App | 2 | 1 | 6 |
| Mar 2023 | BPO | Network Infrastructure | 2 | 5 | 7 |
| Mar 2023 | Real Estate | Website | 1 | 3 | 3 |
| Mar 2023 | Real Estate | API | 0 | 1 | 2 |
| Mar 2023 | Service | Website | 0 | 2 | 3 |
| Apr 2023 | Saas | Web App | 2 | 6 | 4 |
| Apr 2023 | Consulting | Website | 1 | 4 | 2 |
| Apr 2023 | Transportation | IT System | 5 | 4 | 11 |
| Apr 2023 | IT Service | Mobile App | 1 | 3 | 3 |
| Apr 2023 | IT Service | Web App | 1 | 2 | 4 |
| Jun 2023 | Public Sector | Website | 1 | 1 | 3 |
| Jun 2023 | Market Place | Web App | 4 | 3 | 8 |
| Jun 2023 | Financial | Mobile App | 1 | 6 | 4 |
| Jul 2023 | Automotive | Website | 3 | 2 | 8 |
| Jul 2023 | Automotive | Mobile App | 5 | 5 | 8 |
| Jul 2023 | Financial | Network Infrastructure | 0 | 2 | 2 |
| Jul 2023 | IT Service | Website | 0 | 1 | 3 |
| Jul 2023 | Real Estate | Mobile App | 4 | 8 | 8 |
| Aug 2023 | Online Platform | Web App | 5 | 7 | 8 |
| Aug 2023 | Fintech Startup | Mobile App | 1 | 4 | 3 |
| Aug 2023 | Automotive | IT System | 2 | 4 | 5 |
| Aug 2023 | Real Estate | Website | 1 | 3 | 4 |
As part of our penetration testing service, LOGIQUE provides an easy-to-understand report that categorizes findings into the following risk levels:
Vulnerabilities that can be easily exploited with severe impact—such as full data breaches, remote code execution, or critical privilege escalation. Example: Zero-day vulnerabilities, unauthenticated RCE, widespread escalation flaws.
Issues that can damage reputation, disrupt operations, or result in financial loss. Example: SQL Injection, Broken Access Control, hardcoded secrets, bypassed OTP processes.
Vulnerabilities that can affect stability or cause medium-level harm. Example: sensitive data exposure, improper redirect, directory listing enabled.
Low impact issues that still require attention. Example: unsecured cookies, ASP.NET debug enabled, CORS misconfigurations, weak password policies.
Is your system and web truly secure?
LOGIQUE offers world-class penetration testing services conducted by certified professionals (OSCP, CEH, etc.)—all performed in-house to ensure full confidentiality and top-quality results.
We provide clear, actionable reports, fast delivery, and tailored support. That’s why financial institutions, corporations, and government offices trust us.
Ready to get started or learn more?
Feel free to request a sample report or a tailored proposal. No obligations.