Penetration Testing

We conduct security testing of your network perimeter imitating cyber attackers (white, grey or black box). Our experts demonstrate possible attack scripts and ways attackers could use to bypass security tools and gain maximum privileges in critical components of your infrastructure.

What we do:

  • Analyze network perimeter security:
    • Passively collect information about network resources,
    • Conduct active scanning of ports, and identify and analyze available network services,
    • Scan network services and detect their vulnerabilities,
    • Conduct security analysis of web applications,
    • Manually analyze vulnerabilities including authentication flaws and possible critical data publicly available,
    • Conduct credentials bruteforce,
    • Exploit several vulnerabilities previously detected (if possible)
  • Find out ways attackers could use to dive in to your infrastructure 
    • analyze network traffic,
    • conduct active and / or passive redirection attacks or traffic interception attacks,
    • conduct internal instrumental scanning aimed to detect vulnerabilities in network services,
    • go further up to gaining access to important network resources (for example corporate Active Directory domain, business systems, DBMS) or until all available attack methods are tried.


    You can prevent attackers from penetrating your external perimeter and compromising data, and therefore prevent financial and reputational damage.


    Reasonable and appropriate measures are taken to ensure that your personal data is protected from unauthorized access or modification, unlawful destruction, and improper use. No information provided by you will be made available to third parties. Personal data will be held only for as long as is necessary for the purpose for which it is provided and, in any event, will only be kept for 24 months after any application you have made has been completed. By submitting your personal information, you consent to the use of your information as set out in this statement.