Web App Pentest Cost Estimator — Scope, Days, and Range in 60 Seconds
Get a defensible day count and dollar range for your next web application pentest, API test, or mobile assessment. The estimator factors application type, endpoint count, role complexity, compliance framework (SOC 2, PCI-DSS, HIPAA, FedRAMP), methodology, and whether you need a retest — so you can walk into vendor conversations knowing what good looks like.
Your pentest scope
Update any field — the estimated days + cost range recalculate live.
Authenticated + unauthenticated routes combined.
Each pair of roles is a privilege-escalation test path.
Estimated Range
$21,600
to
$30,600
12-17 testing days at ~$1800/day senior tester
Mid-point: $25,200 (14 days)
Standard scope — good fit for a senior 2-person team
Your engagement size lands in the sweet spot for a 2-person team with one lead + one tester. Make sure the SOW spells out: testing methodology (OWASP ASVS level), manual % vs automated %, business logic coverage, and the retest window. If those four aren't in the SOW, ask for them in writing.
What this scope includes
- •Pre-engagement scoping + rules of engagement document
- •OWASP Top 10 + OWASP API Top 10 coverage
- •Manual testing weighted 60-70% (not scanner-only)
- •CVSS 3.1 scoring + business impact rating on every finding
- •Executive summary + technical findings + remediation guidance
- •Customer-shareable summary for your SOC 2 auditor / sales team
- •Business logic flaw chains (workflow abuse, race conditions)
- •Retest within 60 days included in scope
Scope drivers
- •80 endpoints = moderate surface area (+3 days)
- •SOC 2 scope = customer-shareable executive summary + control evidence (+1 day)
- •Business logic flaw testing (chained workflow abuse) adds 2 days of structured testing
- •Retest cycle (re-verify fixes within 30-60 days) adds 2 days
Want a scoping document + 47-question SOW checklist to take to vendors?
How to use this estimate without getting taken
Most pentest engagements go wrong at the scoping stage. The number on the SOW is the easy part — the dangerous part is what you didn't put in the SOW. A vendor can quote half the market price and deliver a glorified Nessus scan that fails to find a single business logic flaw. Or they can quote double the price and deliver a 60-page wall of CVSS scores with no actionable remediation guidance. This estimator gives you the math you need to evaluate both ends of the bell curve.
The day rate baked in here is $1,800/day. That's anchored on the publicly available pricing of mid-market US firms holding the right credentials — OSCP, GWAPT, GPEN, GXPN, CREST — for senior testers (not junior testers fronted by senior names on the SOW). Boutique specialty shops can run $2,200-$2,800/day. Offshore vendors run $600-$1,200/day but often deliver scan-only output you could have run yourself with a free Burp license. Use the $1,800 anchor as your sanity check: if a quote is 40% under that, ask hard questions about manual vs automated testing ratios. If it's 50% above, ask for the actual tester resume and credentials.
The single most important number in your SOW
Manual testing percentage. The OWASP testing guide and the SANS pentest methodology both call out that scanners catch the bottom 20% of findings — the OWASP Top 10 classics, the unpatched libraries, the known CVEs. Business logic flaws, broken auth chains, IDOR (insecure direct object reference), SSRF in the wild, race conditions, and chained vulnerabilities are 100% manual. If your SOW doesn't commit to a manual testing percentage of at least 60%, you're buying a scan. The pentest cost estimator above assumes 60-70% manual on every methodology — adjust the recommendation accordingly if you're comparing scan-only vendors. Our penetration testing service commits to manual testing in writing on every engagement.
Endpoint count: how to ballpark it
For an API, count distinct path+method combinations. A REST API with GET, POST, PUT, DELETE on /users, /products, and /orders is 12 endpoints, not 3. If you have a Swagger or OpenAPI definition, the route count there is your scope. For a web application, count distinct page routes plus any AJAX/fetch endpoints invoked from those pages. CRUD operations on the same resource collapse to one endpoint set. For a typical SaaS web app with 4-6 major resources and customer + admin views, expect 60-120 endpoints. For an API-first product, 100-300 is common. For a mature platform with multiple modules, 300+ is normal — at that point you should be scoping a focused engagement on the highest-risk modules rather than a full-coverage sweep.
User roles: why this number quietly drives cost
Each pair of roles creates a privilege-escalation test path. Two roles = 1 escalation pair (user-to-admin). Three roles = 3 pairs. Five roles = 10 pairs. The cost growth is quadratic, not linear. If you have 6+ distinct roles, expect the day count to climb fast. The right move is to either reduce scope (pick the 2-3 most security-sensitive role pairs) or accept the longer engagement — but go in with eyes open. This is the most common surprise in pentest scoping. Walking through your role hierarchy on a scoping call usually surfaces redundant roles that consolidate without changing the security posture.
Compliance scope: what each framework actually requires
SOC 2 requires a customer-shareable summary plus control evidence. Most auditors accept the standard OWASP Top 10 + OWASP API Top 10 coverage with a documented methodology. PCI-DSS requires explicit cardholder-data-flow validation plus an ASV (Approved Scanning Vendor) external scan layered on top of the manual pentest. HIPAA requires PHI-handling control mapping aligned to the Security Rule (164.308, 164.310, 164.312). FedRAMP requires control mapping to NIST SP 800-53 + 3PAO submission rigor. The estimator adds days for each framework based on the documentation overhead, not extra exploitation work. If a vendor quotes you the same day count for “no compliance” and “FedRAMP,” they're either underestimating the framework or planning to skip the documentation. Both are bad.
Methodology and the white-box discount
White-box testing (the tester gets source code access plus docs plus credentials) is 10-15% faster because the tester isn't reverse-engineering your authorization model from black-box behavior. The trade-off is that white-box findings sometimes miss the things a real attacker would have found through brute external probing — that's why grey-box is the most common methodology in the field. Pick white-box when you have strict timelines, when source code review is itself a deliverable, or when your compliance framework demands it (FedRAMP often does). Pick grey-box for most engagements. Pick black-box only when you have a specific reason to model an external attacker who knows nothing about your stack — typical for high-value bug-bounty-style engagements or for organizations that have just acquired a new product and want a cold read.
Don't forget the retest
A pentest without a retest is half a pentest. The auditor or customer reviewing your report wants proof that the findings got fixed, not just a list of what's broken. A 30-60 day retest window is the industry standard — your team gets time to remediate, the tester comes back, and the final report shows what's remaining vs resolved. Always include this in the SOW. Vendors that charge for retest as an add-on are either nickel-and-diming you or planning a token reissue. Both are red flags. Our guide to penetration testing costs walks through the SOW language to look for.
What you'll get
Related security reading
Web Application Pentest
Our manual-first methodology for SOC 2, PCI, and customer-driven web app tests.
Network Pentest
External + internal network testing with documented MITRE ATT&CK mapping.
Active Directory Pentest
Focused AD/Kerberos testing for organizations on Microsoft stacks.
MITRE ATT&CK Assessment
Map your defensive coverage across all 14 ATT&CK Enterprise tactics.
Penetration Test Cost in 2026
A full pricing breakdown by app type, compliance, and tester credential.
Best Pentest Firms in Georgia (2026)
A regional comparison of vendor capability, certification depth, and pricing.
FAQs
How accurate is this pentest cost estimator?
The estimator is anchored on a $1,800/day senior tester rate that's a defensible mid-market US benchmark for senior testers holding OSCP, GWAPT, or equivalent credentials. The day count is calculated from real engagement scopes — application type, endpoint count, role-pair combinations, compliance framework, and methodology choice. It's a credible scoping starting point, not a binding quote.
Why is FedRAMP so much more expensive than SOC 2?
FedRAMP requires control mapping to NIST SP 800-53, evidence packages that go through 3PAO review, and a higher procedural bar on rules-of-engagement and reporting. SOC 2 needs a customer-shareable summary + control evidence but the underlying testing methodology is similar.
What's the difference between black-box, grey-box, and white-box testing?
Black-box gives the tester nothing — no docs, no source, no credentials. Grey-box gives the tester docs and test credentials at each role level. White-box adds source code review.
Should I always include a retest cycle in the SOW?
Yes. A 30-60 day retest window is industry standard and adds 1-2 days to most engagements. If a vendor charges extra for retest as a line item, that's a red flag.
How do you count endpoints?
We count distinct routes, including unauthenticated and authenticated. For a REST API that's individual paths + methods. For a web app that's distinct page routes.
Companion reading for the pentest cost calculator
All postsPenetration Test Cost (2026)
Real pricing for web app, network, AD, and red team engagements.
Read postWhat Is Penetration Testing? A Founder's Buyer Guide
What a pentest actually is, the five types you can buy, and what a real report looks like.
Read postSOC 2 Pentest Prep Guide (2026)
Pre-audit pentesting that maps cleanly to SOC 2 CC controls.
Read post
Bring your scope to a 20-minute pentest call
If you already have a quote from another vendor, the fastest way to know whether it's worth the money is 20 minutes on a call. We'll walk through the SOW, point out the gaps, and tell you whether the number makes sense — or whether you're paying for a scan disguised as a pentest.
Or reach us directly: (770) 652-1282 · beltz@quantlabusa.dev