pen test

adad

Part B: Pen Test Report (50 points)

Don't use plagiarized sources. Get Your Custom Essay on
pen test
Just from $13/Page
Order Essay

Students are required to write a 5,000 words report related to penetration testing in which they will design their own penetration tests and document the results and solutions by following best practices.Students are allowed to use any real case scenario or arbitrarily work with virtual machines with vulnerabilities (like Metasploitable2) for the development of their penetration tests. The assignment will consist of three sections:

Section 1: Penetration Test Design (30%)

Using the penetration testing methodology reviewed in class, you must describe how each stage will be carry out as well as the tools that will be used in each stage. Your design must be backed up by best practices and must include appropriate references. This section must include ALL stages of the ethical hacker methodology.

Section 2: Execution of the penetration tests (20%)

For this, you will create a video, or a recording of your screen, that demonstrates how each stage was carried out. The video doesn’t need to include audio but your SID must be displayed somewhere within the desktop being recorded. For support on recording tools please get in touch with your tutor. 

Section 3: Documentation and solutions (40%)

Each vulnerability found must be properly documented and a possible solution/correction must be included. References to best practices are needed in this section. You can use the following template as a guide:

Template

Please note that 10% of the mark will be given to the quality of your report. You must take care of the grammar, spelling, and follow a proper academic style when writing your report.

The final document must be submitted via Turnitin.

For

<>

From

ATTENTION: This document contains information from NII that is confidential and privileged.
The information is intended for the private use of <>. By accepting this document you agree to
keep the contents in confidence and not copy, disclose, or distribute this without written
request to and written confirmation from NII. If you are not the intended recipient, be aware
that any disclosure, copying, or distribution of the contents of this document is prohibited.

Penetration Testing Report

CONFIDENTIAL 2
© NETWORK INTELLIGENCE (I) PVT. LTD.

Document Details

Company <>

Document
Title

Penetration Testing

Report

Date
Ref <>/NII/06122005

Classification Public

Internal Confidential Highly
Confidential

Document
Type

Report

Recipient

Name Title Company
<>

Document History

Date Version Author Comments
1.0 Initial draft
1.1 Review and formatting

CONFIDENTIAL 3
© NETWORK INTELLIGENCE (I) PVT. LTD.

Contents

1 EXECUTIVE SUMMARY ……………………………………………………… 4

1.1 SUMMARY ……………………………………………………………………. 4
1.1.1 Approach ………………………………………………………….. 4

1.2 SCOPE ………………………………………………………………………. 5
1.3 KEY FINDINGS ………………………………………………………………… 6

1.3.1 Insufficient Authentication ………………………………………. 6
1.3.2 Improper Input Filtration ………………………………………… 6
1.3.3 Administrator login and Username Enumeration ……………….. 7

1.4 RECOMMENDATIONS …………………………………………………………… 8
1.4.1 Tactical Recommendations ………………………………………. 8
1.4.2 Strategic Recommendations ……………………………………… 9

1.5 TABULAR SUMMARY …………………………………………………………..10
1.6 GRAPHICAL SUMMARY …………………………………………………………11

1.6.1 Overall Risk Chart ………………………………………………..11

2 TECHNICAL REPORT ……………………………………………………… 12

2.1 NETWORK SECURITY ………………………………………………………….12
2.1.1 Port Scan Status ………………………………………………….12
2.1.2 Service Banner Disclosure ………………………………………..14

2.2 WEB APPLICATION VULNERABILITIES …………………………………………….16

3 CONCLUSION ……………………………………………………………… 21

4 APPENDIX …………………………………………………………………. 22

4.1 SQL INJECTION ………………………………………………………………22

Penetration Testing Report

CONFIDENTIAL 4
© NETWORK INTELLIGENCE (I) PVT. LTD.

11 EExxeeccuuttiivvee SSuummmmaarryy

1.1 Summary

<> has assigned the task of carrying out Quarterly Penetration Testing of
, to Network Intelligence (I) Pvt. Ltd.

This is the second quarter Penetration Testing report. This Penetration Test
was performed during . The detailed report about each task and our
findings are described below.

The purpose of the test is to determine security vulnerabilities in the server
configurations and web applications running on the servers specified as part of
the scope. The tests are carried out assuming the identity of an attacker or a
user with malicious intent. At the same time due care is taken not to harm the
server.

1.1.1 Approach

Perform broad scans to identify potential areas of exposure and services
that may act as entry points

Perform targeted scans and manual investigation to validate
vulnerabilities

Test identified components to gain access to:
o <10 IP addressed devices>

Identify and validate vulnerabilities
Rank vulnerabilities based on threat level, loss potential, and likelihood
of exploitation

Perform supplemental research and development activities to support
analysis

Identify issues of immediate consequence and recommend solutions
Develop long-term recommendations to enhance security
Transfer knowledge

During the network level security checks we tried to probe the ports present on
the various servers and detect the services running on them with the existing
security holes, if any. At the web application level we checked the web
servers’ configuration issues, and more importantly the logical errors in the
web application itself.

Penetration Testing Report

CONFIDENTIAL 5
© NETWORK INTELLIGENCE (I) PVT. LTD.

1.2 Scope

The scope of this penetration test was limited to the below mentioned IP
addresses.

Penetration Testing Report

CONFIDENTIAL 6
© NETWORK INTELLIGENCE (I) PVT. LTD.

1.3 Key Findings

In this section we would like to highlight summary of the critical issues that we
discovered during our Penetration Testing exercise.

1.3.1 Insufficient Authentication

On pages [..], the user can login and get the access with any username and
password.

Recommendation
Proper authentication mechanism should be implemented along with a good
password policy.

1.3.2 Improper Input Filtration

The input values are not parsed properly. By exploiting this vulnerability, an
attacker can insert a single URL, and send it to another user or steal session
IDs. Improper filtration has revealed the following vulnerabilities.

• Database manipulation is possible through an attack technique – SQL
injection1. The vulnerability can be exploited through the username and
password fields. Successful exploitation may also allow an attacker to
run arbitrary SQL Query on the server.

• The xyz.com servers were found vulnerable to Cross-site scripting (XSS)

attack2. Absence or lack of Input filtration in the scripts allows an
attacker to insert a single URL3, or a malicious Java Script in the link,
and send it to another user. As the malicious script is run in the context
of web site, the victim will consider the malicious URL
as a valid URL. This happens when the parameter values are used from
the URL to create the web page.

• In another instance, input is not properly sanitized allowing any

malicious URL to be sent to the victim with a fake summary. The
situation is then very similar to the Cross-site scripting attack.

1 SQL Injection: http://en.wikipedia.org/wiki/SQL_Injection
2 http://en.wikipedia.org/wiki/Cross-site_scripting
3 URL: Universal Resource Locator

Penetration Testing Report

CONFIDENTIAL 7
© NETWORK INTELLIGENCE (I) PVT. LTD.

Recommendation
All data on all the pages should have input as well as output filtering. If
possible, meta-characters like <>,.?^&/\~`’”-() should be completely removed
from a user’s input. SQL injection should be mitigated by using stored
procedures, and reducing the privilege levels with which the database
executes.

1.3.3 Administrator login and Username Enumeration

The Administrator login validation script returns different errors when

1. An invalid username is supplied
2. A valid username and invalid password is supplied.

This can assist an attacker to get hold of a valid username and then carry out a
brute force attack4. Similarly, username enumeration is also possible in case
of the vendor login validation script.

A Test account exists on the server. It is recommended to disable/delete such
accounts.

Recommendation
Remove any unnecessary accounts and make the error messages across pages
consistent so as not to disclose any unsolicited information.

4 Phrase reference: http://en.wikipedia.org/wiki/Brute_force_attack

Penetration Testing Report

CONFIDENTIAL 8
© NETWORK INTELLIGENCE (I) PVT. LTD.

1.4 Recommendations

NII recommends that attention is given to the issues discovered during this
assessment and that an action plan is generated to remediate these items.

The recommendations are classified as tactical or strategic. Tactical
recommendations are short term fixes to help elevate the immediate security
concerns. Strategic recommendations focus on the entire environment, future
directions and introduction of security best practices. A highlight of the
recommendations follows:

1.4.1 Tactical Recommendations

Filter User Input – Users input can have malicious characters which may
result in attacks like SQL injection, XSS etc.

Use stored procedures- To mitigate the risk from SQL injection, in
addition to user input validation, stored procedures should also be used.

Avoid username enumeration – Display consistent error messages for
any combination of username and password.

Implement access control on SQL server – Give appropriate privileges
to authorized users only.

Change Firewall ACL configuration: If port 110 is not required to be
open on the Internet, modify the ACL to block all incoming traffic.

Upgrade phpBB: Upgrade phpBB to prevent critical attacks exploiting
known vulnerabilities in phpBB.

Block ICMP incoming traffic – ICMP can be used to launch denial of
service attacks against targeted equipment. Disable ICMP at the router
and firewall to ensure this type of action is protected against.

Disable HTTP Trace method – The trace method can be used to leverage
cross-site scripting attacks against <>. This method should be disabled
from the web service.

Disable unnecessary IIS extensions – Extraneous IIS extensions (.printer
& .IDA) can be used to launch attacks against the web service. These
extensions should be disabled if not required by <>.

Information Disclosure – MS SQL stored procedure names and its
parameters’ information is accessible via the error pages on the website.
This information should be blocked from web surfers.

Block extraneous services – Access to various services is available via
the Internet. These services should be either turned off or blocked so an
attacker cannot take advantage of these extra attack vectors.

Disable FrontPages – Microsoft FrontPages was found on a few servers in
the environment. This service should be disabled so it cannot be
exploited via the Internet.

Penetration Testing Report

CONFIDENTIAL 9
© NETWORK INTELLIGENCE (I) PVT. LTD.

1.4.2 Strategic Recommendations

Conduct proactive security assessments – As part of security best
practices; should ensure that any major changes to their Internet
facing infrastructure should require another external security assessment.
This should be done to ensure that these changes do not increase the risk
to environment.

Intrusion Detection (IDS) – Networks exposed to potentially hostile traffic

should implement some capability to detect intrusions. Investigate an IDS
solution for the network.

Penetration Testing Report

CONFIDENTIAL 10
© NETWORK INTELLIGENCE (I) PVT. LTD.

1.5 Tabular Summary

The following table summarizes the System’s Vulnerability Assessment:

Category Description

Systems Vulnerability Assessment Summary

Number of Live Hosts 50

Number of Vulnerabilities 29

High, Medium and info Severity
Vulnerabilities

14 6 9

Vulnerability Summary

Penetration Testing Report

CONFIDENTIAL 11
© NETWORK INTELLIGENCE (I) PVT. LTD.

1.6 Graphical Summary

1.6.1 Overall Risk Chart

0

0.2

0.4

0.6

0.8

1

High
Medium
Low

PS BA SQL Inj phpBB UE XSS

PS: Port Scan
BA: Broken Authentication
SQL Inj: SQL Injection
phpBB: phpBB Known Vulnerabilities
UE: User Enumeration
XSS: Cross-site Scripting

Penetration Testing Report

CONFIDENTIAL 12
© NETWORK INTELLIGENCE (I) PVT. LTD.

22 TTeecchhnniiccaall RReeppoorrtt

2.1 Network Security

2.1.1 Port Scan Status

For the domain, ‘xyz.com’ the below listed IPs were scanned. The listed ports
appear to be open on the server. Alongside the port number, we also show the
service that usually runs on those ports as well as the banner displayed by the
service.

Domain:

IP Address: 10.0.180.218

Port No Service Running Service Version Details
25 SMTP
80 HTTP Apache
110 POP3
443 HTTPS OpenSSL

Domain:

IP Address: 10.0.137.219

Port No. Service Running Service Version Details
25 SMTP Sendmail
80 HTTP Apache
110 POP3 UW Imap pop3 server 2003.83rh
443 SSL Open SSL

Penetration Testing Report

CONFIDENTIAL 13
© NETWORK INTELLIGENCE (I) PVT. LTD.

Domain:

IP Address: 10.0.167.150

Port No Service Running Service Version
Details

22 SSH Remote Login Protocol —
25 Simple Mail Transfer Sendmail
80 World Wide Web HTTP Apache
3306 MySQL MySQL server

Analysis
We have observed that only the required and genuine ports are open on the
server. However, it is recommended that the firewall should block the ping
request. As a result of this the number of port scans coming on the network via
the internet will decrease (thereby decreasing the reconnaissance attempts).

The SSL certificate of IP 10.0.167.152 has expired.

Penetration Testing Report

CONFIDENTIAL 14
© NETWORK INTELLIGENCE (I) PVT. LTD.

2.1.2 Service Banner Disclosure

Severity Level
Medium

Summary
Banner grabbing is a technique of connecting to remote applications and
observing the output. It can be very useful to remote attackers. With this an
attacker can get the software name and version running on the server, which
then allows him/her to concentrate on platform cum version-specific
techniques to compromise the server.

Analysis
1. Banner grabbed for the service running on the port 110

2. Banner grabbed for the service running on port 3306

Penetration Testing Report

CONFIDENTIAL 15
© NETWORK INTELLIGENCE (I) PVT. LTD.

3. Banner grabbed for the service on port number 10000 running at IP Address
10.0.167.152

Recommendation
It is advisable to change the banners of the services running on the server to
something generic that does not identify the exact service (and version)
running on the server. Also, restrict access to ports that need not to be used by
normal users, especially the ‘webmin’ port 10000, which is used only for server
administration.

References
http://www.educause.edu/content.asp?page_id=1298&bhcp=1

http://www.educause.edu/content.asp?page_id=1298&bhcp=1

Penetration Testing Report

CONFIDENTIAL 16
© NETWORK INTELLIGENCE (I) PVT. LTD.

2.2 Web Application Vulnerabilities

Risk Description Threat Level Potential
Corporate

Loss

Likelihood of
Exploitation

Affected
IP’s/URI

Recommenda
tion

Broken
Authentication
The user can login
and get the access
with any username
and password.

Severe A
significant
amount of
privileged
informatio
n was
found.

Because
there was no
authenticatio
n it is trivial
to break in
to the system
and get
sensitive
information

Proper
authenticatio
n mechanism
should be
implemented
along with a
good
password
policy.

SQL Injection
SQL injection exists
in the username
and password
fields. This may
also allow an
attacker to run
arbitrary SQL
Query on the
server.

Severe An
attacker
can gain
access to
personal
employee
informatio
n. The
version of
SQL
server,
database,
and server
name was
also
revealed.
It was
possible
to
enumerat
e the
entire
database
table and
also quite
likely to
run
malicious
commands
like “drop
table”,

SQL injection
is an old
technique
and it does
not require
much
technical
skills to
exploit the
database and
run malicious
queries.

It is
advisable to
filter all the
input data
before
running the
SQL query
and allow
only valid
characters.
For e.g.:-
disallow
single
quotes(‘),
comments(–)

etc.

Use least
privilege
principle and
allow only
the
necessary
privileges.

Penetration Testing Report

CONFIDENTIAL 17
© NETWORK INTELLIGENCE (I) PVT. LTD.

etc.

Vulnerable PHPbb
version

Severe Possible
system
compromi
se as most
of the
exploits
are
available.

It is simple to
exploit as all
exploits are
published on
vulnerability
reporting
sites.

Upgrade the
version of
PHPbb and
visit the
website for
regular
updates.

Username
Enumeration
Error pages
returned by the
Authentication
script disclose valid
username details
to the attacker.

Moderate On
obtaining
valid
usernames
an
attacker
could
brute
force to
look for a
weak
password

Such
exploitation
is less likely
to occur if
the password
is strong.

The
validation
script should
not reveal
the presence
of valid
username by
displaying
different
error pages
as shown in
the screen
shots.

This
information
is critical in
carrying out
social
engineering
attacks.

Cross site scripting
It allows an
attacker to run
arbitrary script in
the victim’s
browser.

Moderate An
attacker
may use
this flaw
to trick
your web
users to
give
him/her
their
credential
s (cookie)

This attack is
dependant
on the victim
to execute a
crafted link.

All data on
all the pages
should have
input as well
as output
filtering. If
possible,
meta-
characters
like
<>,.?^&/\~`’
”-()

Penetration Testing Report

CONFIDENTIAL 18
© NETWORK INTELLIGENCE (I) PVT. LTD.

which can
be used
for session
hijacking.

from a user’s
input should
be
completely
removed.
Input: ‘<’ character Modified during output: ‘&lt’

FrontPage
extensions
enabled
FrontPage has a
long history of
remote
vulnerabilities as
well as mis-
configurations
which make
unauthorized
remote publishing
possible.

Moderate An
attacker
equipped
with a
FrontPage
exploit
could
remotely
compromi
se the
web
server.

Hackers
actively
target and
compromise
servers with
FrontPage
extensions
enabled.

To prevent
having these
extensions
from being
Internet
facing, set
up a staging
server for
publishing.

Web server
supports TRACE
methods
TRACE HTTP
method is used to
debug web server
connections. It has
been shown that
servers supporting
this method are
subject to cross-
site-scripting
attacks.

Moderate An
attacker
may use
this flaw
to trick
your web
users to
give
him/her
their
credential
s.

This attack is
dependant
on the victim
to execute a
provided
link. Since
user
interaction is
required, this
attack is less
likely than
automated
attacks.

Deny HTTP
TRACE
requests or
permit only
the methods
needed to
meet site
requirements
and policy.
More
information
can be found
at:
www.kb.cert
.org/vuls/id/
867593

URL Redirection
A known
vulnerability exists
in Outlook Web
Access which
allows the attacker
to redirect the
victim to some
malicious web site,
this will lead to
phishing attack.

Low No direct
loss is
attributab
le. The
victim will
associate
same trust
to the
crafted
URL as he
will
associate
with

Such
redirection is
less likely to
occur

URL should
be parsed
appropriately
.

http://www.kb.cert.org/vuls/id/867593

http://www.kb.cert.org/vuls/id/867593

http://www.kb.cert.org/vuls/id/867593

Penetration Testing Report

CONFIDENTIAL 19
© NETWORK INTELLIGENCE (I) PVT. LTD.

l>

Resource
exhaustion
It is possible to
retrieve the entire
record by using a
wild card (“%%”).
This results in a
resource
consuming SQL
query.

Low The
attacker
can waste
the
system
resources
and cause
possible
denial of
service to
legitimate
user(s).

Implement
input
filtering

Information
Disclosure
Error pages
disclose stored
procedure and the
parameters
expected in the
database. It also
reveals the ASP.net
version.

Low An
attacker
would
search for
known
vulnerabili
ties for
the
version
disclosed.

Such
exploitation
is less likely
to occur.

Customize
the error
pages to
provide only
required
information.

Outdated Web
Servers
Older version of IIS
[5.0] is used. This
version is highly
vulnerable.

Low An
attacker
would
search for
known
vulnerabili
ties for
the
version
disclosed.

Such
exploitation
is less likely
to occur.

Upgrade to
IIS 6.0

Outdated SSL
Certificate

Low An
attacker
can sniff
sensitive
data

Such
exploitation
is less likely
to occur.

Renew SSL
certificate.

Penetration Testing Report

CONFIDENTIAL 20
© NETWORK INTELLIGENCE (I) PVT. LTD.

Improper ACL
Configuration

Low Firewall
allows
incoming
and
outgoing
traffic at
Port 110

Such
exploitation
is less likely
to occur

Refer to
port
scanning
result for
all IP’s
showing
port 110
closed.

Modify ACL
Configuration

Penetration Testing Report

CONFIDENTIAL 21
© NETWORK INTELLIGENCE (I) PVT. LTD.

33 CCoonncclluussiioonn

Experience has shown that a focused effort to address the problems outlined in
this report can result in dramatic security improvements. Most of the identified
problems do not require high-tech solutions, just knowledge of and
commitment to good practices.

For systems to remain secure, however, security posture must be evaluated
and improved continuously. Establishing the organizational structure that will
support these ongoing improvements is essential in order to maintain control of
corporate information systems.

We conclude that the overall security needs to improve. We hope that the
issues cited in this report will be addressed.

Penetration Testing Report

CONFIDENTIAL 22
© NETWORK INTELLIGENCE (I) PVT. LTD.

44 AAppppeennddiixx

This section provides the screen shots of the known vulnerabilities presented in
the observations and findings table.

4.1 SQL Injection

IP: X.X.X.X

Penetration Testing Report

CONFIDENTIAL 23
© NETWORK INTELLIGENCE (I) PVT. LTD.

First record retrieved:

  • 1 Executive Summary
  • 1.1 Summary
    1.1.1 Approach
    1.2 Scope
    1.3 Key Findings
    1.3.1 Insufficient Authentication
    1.3.2 Improper Input Filtration
    1.3.3 Administrator login and Username Enumeration
    1.4 Recommendations
    1.4.1 Tactical Recommendations
    1.4.2 Strategic Recommendations
    1.5 Tabular Summary
    1.6 Graphical Summary
    1.6.1 Overall Risk Chart

  • 2 Technical Report
  • 2.1 Network Security
    2.1.1 Port Scan Status
    2.1.2 Service Banner Disclosure
    2.2 Web Application Vulnerabilities

  • 3 Conclusion
  • 4 Appendix
  • 4.1 SQL Injection

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy