home

HOME

about

ABOUT US

services

SERVICES

others menu

OTHERS

close

Penetration Testing Service from Jakarta, Indonesia

Professional penetration testing, performed in-house by OSCP-certified experts — with clear, competitive pricing.

At LOGIQUE, we deliver high-quality penetration testing services performed entirely by our in-house security engineers. With internationally certified testers (e.g., OSCP), your sensitive data remains safe — no outsourcing involved. We don’t just identify vulnerabilities; we also offer optional support for remediation. Enterprise-grade testing at affordable rates. Trusted by leading organizations in Indonesia and beyond.

Why Choose LOGIQUE for Penetration Testing?

Specialized. Certified. Trusted.
Penilaian Kerentanan Menyeluruh

Specialized. Certified. Trusted.

LOGIQUE is not a general IT security vendor. We specialize in penetration testing. All testing is conducted by our in-house OSCP+ certified professionals — no outsourcing. We simulate real-world attacks to identify hidden vulnerabilities before attackers do.

Penetration Testing

Tailored Testing to Fit Your Risks

Every organization has unique digital assets and risk factors. We provide customized pentest strategies, aligned with your infrastructure and business logic. This ensures practical, relevant, and actionable results.

Penilaian Risiko Personil

Reliable Post-Test Support

Unlike many providers, LOGIQUE doesn’t stop at identifying issues. Our expert developers can assist in fixing vulnerabilities (upon request), and we deliver detailed reports to help you take the next step toward securing your digital assets.

Penilaian Kerentanan Menyeluruh

Certified & In-House Professionals

Our penetration tests are conducted by in-house experts certified with OSCP, CEH, CPENT, and more. Unlike many vendors, we don’t outsource — ensuring high-quality results and maximum confidentiality for your sensitive systems.

Penetration Testing

Competitive Pricing, High ROI

LOGIQUE offers world-class quality at accessible pricing. Starting from as low as 30 million IDR per system, our services help companies of all sizes get the protection they need — without breaking the bank.

Penilaian Risiko Personil

Fast Results with Real-World Value

We deliver results quickly, with clear, actionable reports. Our process is efficient and optimized to meet urgent needs without sacrificing quality.

Coverage and Pricing of LOGIQUE's Pentest Services

Website OWASP Top 10

An IT system or web application typically contains various important data, making data leakage highly undesirable. LOGIQUE’s penetration testing services help address this risk: our IT security experts will define the scope of testing and conduct a comprehensive assessment. If remediation is required, LOGIQUE can also connect you with a qualified IT development partner.

  • Laporan mudah dimengerti Easy-to-understand security reports
  • Dukungan penuh hingga tes ulang Full support until the retest is complete
  • Pengujian API API vulnerability testing (if applicable)
  • Pengujian komprehensif Comprehensive testing for web apps and systems

We provide pentest services for the following web applications and systems

CRM IOT App
HRS Cloud Based System and Infrasstructure
Auction Management System Fleet Management System
Sistem Manajemen Poin Auction Management System
Sistem Manajemen Poin E-Commerce
Sistem Manajemen Poin Sistem Manajemen Pelanggan (CRM)
Sistem Manajemen Poin HRS

Key Items in the Penetration Testing Process to a Website

cloud

Input/Output Testing

Validation of user input, both on the client side and the server side, is essential to prevent attacks such as injection or malicious scripts. On the other hand, the application's output must also be properly handled to prevent exploitation such as XSS or injection

cloud

Authentication & Login Error Handling

Verifies login procedures, secure handling of login credentials, and user feedback messages.

cloud

Access Control & Role-Based Issues

Checks for privilege escalation and unauthorized access to restricted resources or features.

cloud

Session Management

Evaluates session fixation vulnerabilities and CSRF (Cross-Site Request Forgery) risks.

cloud

Default Content & General Weaknesses

Detects leftover sample programs, open directories, and other default elements that could be exploited.

Infrastructur

Mobile apps (Android/iOS) often handle sensitive personal or business data, making security vulnerabilities especially critical. LOGIQUE’s mobile application penetration testing service identifies hidden risks before attackers can exploit them. Our comprehensive assessments also cover interactions with web APIs to ensure overall app security.

  • Laporan mudah dimengerti Clear, easy-to-understand vulnerability reports
  • Dukungan penuh hingga tes ulang Full support provided until vulnerabilities are resolved, including retesting
  • Dukungan penuh hingga tes ulang Testing conducted by certified security professionals such as OSCP and CEH
  • Pengujian API Flexible scope including web API penetration testing
  • Pengujian komprehensif Covers both Android and iOS platforms

We perform security tests on the following Mobile App

CRMHR Application
HRS E-Learning Application
Customer Relationship Management (CRM) PWA
Auction Management System E-Auction Application
Sistem Manajemen PoinInspection Application
Sistem Manajemen Poin E-Commerce Application

Key Items in Mobile Application Security Testing

Improper Platform Usage

Testing for abuse of platform features or failure to enforce standard security controls.

Insecure Data Storage

Areas to be tested include SQL databases, log files, manifest files, binary data, cookie stores, SD cards, or synced cloud storage.

Insecure Communication

Review of request/response traffic to check for secure protocol usage.

Insecure Authentication

Testing hidden service requests or interface dependency issues related to broken authentication.

Insufficient Cryptography

Tests for cryptographic implementation flaws or weak encryption methods.

Insecure Authorization

Testing for authorization bypass via binary attacks or privilege escalation scenarios.

Client Code Quality / Client Side Injection

Review of mobile app client-side code quality and injection vulnerabilities.

Code Tampering

Testing for vulnerabilities that allow runtime code modification or manipulation of the execution environment.

Reverse Engineering

Final binary analysis to extract string tables, source code, libraries, algorithms, and embedded resources.

Infrastructur

Infrastructure & Network Penetration Testing

This service is designed to identify potential vulnerabilities in your critical network infrastructure and prevent data breaches before they occur. Testing covers servers, routers, workstations, and cloud environments. Both on-site and remote (VPN-based) testing options are available.

  • Laporan mudah dimengerti Clear, easy-to-understand assessment reports
  • Dukungan penuh hingga tes ulang Full support until retesting after vulnerability fixing
  • Dukungan penuh hingga tes ulang Professional assessment by CEH-certified specialists
  • Pengujian API Testing available either on-site or remotely via VPN
  • Pengujian komprehensif Covers servers, routers, workstations, and cloud environments

We perform security tests on the following Infrastructure

CRMServer
HRS Router
Customer Relationship Management (CRM) Workstation
Auction Management System Cloud

Key Infrastructure Penetration Test Items

cloud

IPV4/IPV6 Scanning & OSINT

  • Advanced network scanning techniques
  • Understanding & exploiting IPv6 targets
  • Advanced open-source intelligence (OSINT) gathering
cloud

Database Server Attacks

  • Targets include MySQL, PostgreSQL, Oracle, MongoDB
cloud

Container Breakout

  • Exploiting Docker vulnerabilities
  • Identifying Kubernetes misconfigurations
cloud

Active Directory Exploitation

  • Delegation reviews, Win 2012 vulnerabilities
  • Pass-the-Hash/Ticket and WinRM pivots
  • Persistence/backdoor: Golden Ticket, DCSync, LOLBAS
cloud

Linux Exploitation

  • Vulnerability configs, X11 issues, and web server breakouts
  • Privilege escalation, MongoDB, kernel exploits
  • Misconfigurations and post-exploitation credential harvesting
cloud

Windows 10 Techniques

  • Local privilege escalation
  • AMSI & AV bypass, offensive PowerShell usage
  • GPO exploit, constrained/unconstrained delegation
cloud

VPN, VOIP, VLAN Attacks

  • Exploiting insecure VPN configuration
  • VOIP enumeration and abuse
  • VLAN hopping and segmentation bypass
cloud

Cloud Infrastructure Hacking

  • Attacks on AWS/Azure/GCPP
  • Storage misconfigurations, token/API abuse
  • Attacks on IaaS, PaaS, SaaS, and serverless platforms
web
Top 10 OWASP Website

An IT system / web application usually comes with a variety of important data, making a data leakage critically undesirable. Logique’s penetration testing services will overcome this, our IT security experts will determine the scope of the test and conduct a comprehensive assessment. To fix the vulnerability, LOGIQUE can also properly introduce you to an IT development company that can handle it.

web
Top 10 OWASP Mobile App

Mobile/smartphone penetration testing serves to review the mobile app’s level of security vulnerability in a mobile application (Android/iOS). Mobile app penetration tests can also include tests for web APIs.

web
Top 10 OWASP Infrastructure

Infrastructure penetration testing is carried out in order to identify any existing security vulnerabilities in regards to critical network infrastructure within the company. The scope of this penetration test is limited to testing servers, routers, workstations, and the cloud. The testing process can also be done remotely or on-site.

LOGIQUE Operates with World-Class Pentest Standards from Indonesia

ceh certificate lpt certificate oscp certificate oscp+ certificate
LOGIQUE’s penetration testing services are backed by highly qualified in-house pentesters holding international certifications including OSCP (Offensive Security Certified Professional), CEH Master, and LPT Master from EC-Council. These credentials demonstrate not only technical capability but also our commitment to global best practices and methodologies.

Why Is Pentesting Important for Your System?

Pentesting gives you a clear picture of how secure your applications, websites, or networks are against cyberattacks. It helps identify and fix vulnerabilities before malicious actors can exploit them.

Cyber threats are a growing concern for any business operating in the digital space. According to a study by the University of Maryland, a hacking attack occurs every 39 seconds globally.

Don't wait until it's too late. Strengthen your digital security today.

Certified Professional Pentest Services from Indonesia with Global Standards

why pentest in logique

LOGIQUE DIGITAL INDONESIA provides professional penetration testing services in Indonesia, conducted by experienced in-house pentesters holding certifications such as OSCP, CEH, and LPT. Our focus is on thoroughly identifying security gaps in your applications, websites, and IT infrastructure.

We follow globally recognized testing methodologies with a combination of automated tools and deep manual analysis, ensuring accurate findings and easy-to-understand technical reports.

When needed, our team is available for on-site testing, allowing security assessments to be conducted directly at your company’s premises.

Our Certifications
centificate ceh
Certified Ethical Hacker Master by EC-Council
centificate cpent
Certified Penetration Testing Profesional by EC-Council
centificate lpt
Licensed Penetration Tester Master by EC-Council
centificate cei
Certified EC-Council Instructor by EC-Council
centificate red team
Certified Red Team Operator by Zero-Point
centificate nse
Network Security Expert
centificate pnpt
Practical Network Penetration Tester by TCM
centificate pnpt
Offensive Security Certified Professional
centificate pnpt
Offensive Security Certified Professional +
centificate pnpt
CompTIA SecurityX ce Certification

LOGIQUE’s Pentesting Methodologies

To ensure an efficient and accurate security assessment, we offer three standard testing approaches:

Gray Box Testing

Gray Box Testing (Our Recommended Option)

A balanced method where testers have partial access (e.g. user credentials, API docs, system architecture).

High accuracy + cost efficiency
Black Box Testing

Black Box Testing (Budget-Friendly Option)

Simulates external attacks without prior knowledge of the system. Recommended for clients with tight budgets.

Lower cost, but limited insight
White Box Testing

White Box Testing (For Full Access Audits)

Involves full access to source code. Suitable for high-risk systems that require deep code review.

Most thorough, highest cost
Stages

What are the key phases LOGIQUE follows in conducting penetration testing?

As a trusted penetration testing vendor in Indonesia, LOGIQUE adheres to internationally recognized standards. Here are the five main steps:

Step 1
1. Reconnaissance

Collecting target-related information via active and passive methods to understand the system architecture and plan the attack strategy.

Step 2
2. Scanning

Using technical tools to detect open ports, active services, and potential vulnerabilities.

Step 3
3. Gaining Access

Exploiting discovered vulnerabilities to gain initial access into the system, followed by controlled testing from within.

Step 4
4. Maintaining Access

Ensuring continued access to observe the system’s behavior over time without being detected.

Step 5
5. Covering Tracks

Removing logs and digital footprints to simulate a real-world stealth attack, ensuring authenticity of the test scenario.

LOGIQUE’s Experience in Penetration Testing

Logika Sarana Teknologi has extensive experience in performing security assessments across various industries. We’ve conducted penetration testing for government websites, fintech firms, e-commerce platforms, automotive manufacturers, and more.

Throughout these engagements, our team has consistently identified security vulnerabilities that could compromise digital assets if not patched promptly.

Some common vulnerabilities we’ve discovered include:

  • Injection
    Injection attacks (SQL, Command Injection)
  • Sensitif data exposure
    Exposure of sensitive data
  • Broken access control
    Broken access control
  • Cross-Site Scripting
    Cross-Site Scripting (XSS)
  • Security misconfiguration
    Security misconfigurations

Remediation Support Services by LOGIQUE

dukungna

We understand that not every company has an internal IT team ready to handle vulnerabilities discovered during penetration testing. If your current IT vendor cannot be relied upon, LOGIQUE offers optional remediation support as an additional service.

Our in-house software developers and DevOps professionals can step in to directly fix and address the security issues uncovered. What makes our service stand out is the tight collaboration between our security and development teams, ensuring that all vulnerabilities are remediated quickly and efficiently—with minimal disruption.

We don’t just point out the problems—we help solve them.

This optional service is subject to technical access and the type of vulnerability identified. Contact us for a consultation to determine how this service can benefit your organization.

Contact Us Now

LOGIQUE Assesment Flow

WEEK 1

week 1 logique

LOGIQUE

  • Scope Definition
  • Pentest Preparation
Preparation 1 week
week 1 logique

CLIENT

  • Pentest Preparation

WEEK 2

week 1 logique

LOGIQUE

  • Pentest Execution
  • Make a report
Assessment, Reporting 2 week
week 1 logique

CLIENT

WEEK 3

WEEK 4

week 1 logique

LOGIQUE

  • Advice how to fix problems
  • Re-assessment
After Support
week 1 logique

CLIENT

  • Fix security holes base on the report

WEEK 1

week 1 logique

LOGIQUE

  • Scope Definition
  • Pentest Preparation
Preparation 1 week
week 1 logique

CLIENT

  • Pentest Preparation

WEEK 2-3

week 1 logique

LOGIQUE

  • Pentest Execution
  • Make a report
Assessment, Reporting 2 week
week 1 logique

CLIENT

WEEK 4

week 1 logique

LOGIQUE

  • Advice how to fix problems
  • Re-assessment
After Support
week 1 logique

CLIENT

  • Fix security holes base on the report

Penetration Testing ByLOGIQUE

Select Year
2019
2020
2021
2022
2023
Time Industry Object of Assesment Found Problems (Risk Level)
High Middle Low
Sep - Oct 2019 Travel Web app 5 4 2
Sep - Oct 2019 Media Online Media 8 0 3
Sep - Oct 2019 Entrainment Network infrastructure 4 2 1
Sep - Oct 2019 E-commerce Market Place Web 8 4 4
Oct 2019 E-commerce PWA 4 3 0
Oct - Nov 2019 Forwarding Website company profile 5 5 3
Oct - Nov 2019 E-commerce Web app 6 0 2
Oct - Nov 2019 E-commerce Web app 2 2 1
Oct - Dec 2019 E-commerce Web app 53 1 0
Nov - Dec 2019 E-commerce Mobile app for Android 2 2 2
Nov - Dec 2019 E-commerce E-commerce 3 2 2
Nov - Dec 2019 E-commerce E-commerce 2 2 1
Nov 2019 Fintech Web app 1 2 3
Nov 2019 Fintech Mobile app for IOS and Android 2 4 2
Dec 2019 Finance Corporate Web 2 1 4
Dec 2019 Automotive Corporate Web 4 0 2
Dec 2019 Service Member web 3 4 3
Time Industry Object of Assesment Found Problems (Risk Level)
High Middle Low
Jan 2020 Fintech Web App 0 2 0
Jan 2020 Fintech Mobile App 1 8 1
Jan 2020 Fintech Network Infrastructure 0 3 0
Feb 2020 Automotive Network Infrastructure 0 0 1
Feb 2020 Service Web App 0 4 1
Feb 2020 Mobilephone Provider Web App 1 10 2
Mar 2020 Airline Web App 0 4 1
Mar 2020 Financial Planner Web App 4 1 2
Mar 2020 Travel Web App 5 4 2
Apr 2020 Service Network Infrastructure 0 1 2
Apr 2020 Service Web App 0 1 3
May 2020 Insurance Web App 4 4 1
May 2020 Insurance Network Infrastructure 0 2 3
Jun 2020 Pharmacies Web App 0 2 0
Jun 2020 Fintech Web App 5 0 0
Sep 2020 Fintech Web App 0 4 2
Oct 2020 Agriculture Network Infrastructure 0 5 1
Time Industry Object of Assesment Found Problems (Risk Level)
High Middle Low
Jan 2021 Automotive Website 1 2 0
Jan 2021 Financial Corporate Web 0 4 2
Feb 2021 Automotive Internal Web System 0 4 2
Feb 2021 Retail Business Mobile App 0 2 3
Feb 2021 E-Learning Web App 0 5 8
Jun 2021 Insurance Web App 0 4 4
Sep 2021 E-commerce Web App 3 2 8
Sep 2021 Public Institution Web System 1 0 5
Oct 2021 Research Company Website 2 1 3
Nov 2021 Food Porducer Web App 0 4 3
Nov 2021 Manufacture Corporate Web 0 3 4
Time Industry Object of Assesment Found Problems (Risk Level)
High Middle Low
Jan 2022 Marketing Agency Corporate Web 0 2 1
Jan 2022 Online media Web app 2 2 3
Jan 2022 Medical Startup Web App 0 2 7
Feb 2022 Manufacture Mobile App 3 1 4
Mar 2022 Automotive Service Web 0 2 2
Mar 2022 Marketing Agency Web App 3 3 5
Apr 2022 Service Mobile App 1 2 4
May 2022 Sier Corporate Web 2 0 2
Jun 2022 Insurance Mobile App 1 2 4
Jun 2022 Fintech Startup Mobile App 1 5 3
Jun 2022 Food Manufacture Web system 1 2 1
Jun 2022 Public Institution Web system 2 4 4
Jun 2022 HR Agency Web App 0 4 4
Jul 2022 Automotive Website 0 3 3
Jul 2022 Retail Website 0 2 5
Jul 2022 Manufacturer Network 0 2 2
Aug 2022 Fintech Startup Mobile App 1 1 4
Aug 2022 Travel Web App 2 2 3
Sep 2022 E-Commerce Web App 4 1 4
Sep 2022 E-Commerce Network Infrastructure 2 1 1
Oct 2022 Online media Web App 1 4 1
Oct 2022 E-Commerce Mobile App 1 2 2
Oct 2022 Manufacturer Network Infrastructure 1 0 1
Nov 2022 Financial Website 0 2 2
Nov 2022 Medical Website 1 4 4
Nov 2022 Manufacturer IT System 6 8 12
Dec 2022 E-Commerce Mobile App 2 2 3
Dec 2022 IT Service Website 1 2 4
Time Industry Object of Assesment Found Problems (Risk Level)
High Middle Low
Jan 2023 Financial Website 1 3 3
Jan 2023 Financial API 1 1 1
Jan 2023 Fintech Startup Network Infrastructure 0 2 2
Jan 2023 Insurance Web App 1 5 2
Feb 2023 Traiding Network Infrastructure 2 3 4
Feb 2023 Traiding IT System 8 17 10
Feb 2023 Food Web App 2 2 3
Feb 2023 Food API 1 1 4
Feb 2023 IT Service Website 1 4 1
Mar 2023 Service Web App 2 1 6
Mar 2023 BPO Network Infrastructure 2 5 7
Mar 2023 Real Estate Website 1 3 3
Mar 2023 Real Estate API 0 1 2
Mar 2023 Service Website 0 2 3
Apr 2023 Saas Web App 2 6 4
Apr 2023 Consulting Website 1 4 2
Apr 2023 Transportation IT System 5 4 11
Apr 2023 IT Service Mobile App 1 3 3
Apr 2023 IT Service Web App 1 2 4
Jun 2023 Public Sector Website 1 1 3
Jun 2023 Market Place Web App 4 3 8
Jun 2023 Financial Mobile App 1 6 4
Jul 2023 Automotive Website 3 2 8
Jul 2023 Automotive Mobile App 5 5 8
Jul 2023 Financial Network Infrastructure 0 2 2
Jul 2023 IT Service Website 0 1 3
Jul 2023 Real Estate Mobile App 4 8 8
Aug 2023 Online Platform Web App 5 7 8
Aug 2023 Fintech Startup Mobile App 1 4 3
Aug 2023 Automotive IT System 2 4 5
Aug 2023 Real Estate Website 1 3 4

Our Clients

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25

Sample Report

Pentest Report Outline
PENETRATION TESTING

WEB APP
Pentest Report Outline
Pentest Report Outline
MISSING AUTHORIZATION MECHANISM

WEB APP
Missing Authorization Mechanism
Pentest Report Outline
BYPASSING UNRETRICTED FILE UPLOAD

WEB APP
Bypassing Unrestricted File Upload
Pentest Report Outline
SQL
Injection

WEB APP
SQL Injection
Pentest Report Outline
UNENCRYPTED LOCAL STORAGE

WEBSITE
Unencrypted Local Storage
Pentest Report Outline
TELNET SERVICE EXTERNALLY AVAILABLE

Security
Telnet Service Externally Available

LOGIQUE Classifies Security Vulnerabilities into 4 Risk Levels

As part of our penetration testing service, LOGIQUE provides an easy-to-understand report that categorizes findings into the following risk levels:

High Security Risk

Critical Risk

Vulnerabilities that can be easily exploited with severe impact—such as full data breaches, remote code execution, or critical privilege escalation. Example: Zero-day vulnerabilities, unauthenticated RCE, widespread escalation flaws.

High Security Risk

High Risk

Issues that can damage reputation, disrupt operations, or result in financial loss. Example: SQL Injection, Broken Access Control, hardcoded secrets, bypassed OTP processes.

High Security Risk

Middle Risk

Vulnerabilities that can affect stability or cause medium-level harm. Example: sensitive data exposure, improper redirect, directory listing enabled.

High Security Risk

Low Risk

Low impact issues that still require attention. Example: unsecured cookies, ASP.NET debug enabled, CORS misconfigurations, weak password policies.

FAQ

FAQ
LOGIQUE’s security team is composed of experienced penetration testers certified with CEH (Certified Ethical Hacker), LPT (Licensed Penetration Tester), CPENT (Certified Penetration Testing Professional), and OSCP (Offensive Security Certified Professional).
The duration depends on the scope of the test. Typically, it takes between 1 to 3 weeks.
LOGIQUE applies testing standards based on OWASP (Open Web Application Security Project) guidelines.
A penetration test reveals how vulnerable your systems are to cyberattacks and helps you proactively identify and address security risks.
Costs vary depending on system type, scope, and complexity. For detailed pricing, please contact us through the inquiry form on our website.
Basically, the client just needs to explain the structure and flow of the system. If necessary, we may request documents such as test accounts or network architecture diagrams for better preparation.
No. While we may use automated tools during the initial scanning phase, all key penetration testing procedures are performed manually by our professional testers to ensure in-depth analysis.
A VA uses automated tools to detect known vulnerabilities. In contrast, a PT involves manual testing to simulate real-world attacks and verify the actual risk level. PT provides a more realistic and thorough assessment of security posture.
In whitebox testing, the tester is provided with internal system information such as source code or admin access, allowing for detailed analysis. In blackbox testing, the tester simulates an attacker with no prior knowledge, assessing how an outsider might exploit vulnerabilities.
No. LOGIQUE provides penetration testing services across all of Indonesia and can also support clients located overseas.
Contact Us

HUBUNGI LOGIQUE

Is your system and web truly secure?

LOGIQUE offers world-class penetration testing services conducted by certified professionals (OSCP, CEH, etc.)—all performed in-house to ensure full confidentiality and top-quality results.
We provide clear, actionable reports, fast delivery, and tailored support. That’s why financial institutions, corporations, and government offices trust us.

Ready to get started or learn more?

Feel free to request a sample report or a tailored proposal. No obligations.