Skip to Content

Penetrationtest | Pentest

Penetrations-tests | Pentests

The ultimate test for your IT security landscape.



  Targeted vulnerability analysis through realistic attack simulations


  Individual reports with clear recommendations for action


  Lasting optimization of the IT security landscape


Would you like to learn more about our pentesting services and prices or receive a specific quote?​


The ultimate test for your IT security landscape.



  Proactive vulnerability analysis through realistic attack simulations


  Individual reports with clear recommendations for action


  Sustainable optimization towards DORA and NIS2 compliance



Would you like to learn more about our pentesting services and prices?

One of the most effective methods of assessing an organization's security status is penetration testing – a targeted IT security audit to uncover potential gaps in IT infrastructures. An important step towards DORA and NIS2 compliance.


Our experts test your company for vulnerabilities – using the same tools, tactics and procedures (TTP) as real attackers, as well as strategic testing and consulting. Based on our many years of experience and expertise in the areas of offensive and defensive security, we offer you targeted recommendations and solutions to minimize your attack surface – optimized for companies in the mid-size sector.

What gaps does your IT infrastructure have?


SECURITY FACTORY | IDENTIFY | PENETRATIONTEST

Our Pentesting Services



External Penetration Test

Testing of the network perimeter, i.e. IT services accessible via the public Internet

Web Application Penetration Test

Specific analysis the security of a web-based application

USB Drop Assessment

Simulation of a realistic attack using specially prepared USB sticks

Cloud Assessment

Checking the cloud infrastructure for security vulnerabilities and misconfigurations

Internal Penetration Test

Testing of the internal network involving a “assume breach” approach

White-Box (Web) Application Penetration Test

Additional examination of the source code of the application for security gaps and vulnerabilities

Stolen Asset Assessment

Checking the security of a stolen device, such as a company laptop

Microsoft 365 Audit

Checking the Microsoft 365 and Entra ID configuration for security vulnerabilities and misconfigurations

Spear Phishing

Specific attacks on users via email

Mobile App Assessment (Android)

Uncoverage of potential vulnerabilities in Android applications

WiFi Assessment

Uncoverage of vulnerabilities in a WiFi infrastructure

Red Team Assessment

Simulation of a realistic attack to test the organization's overall security situation

More information about our pentesting services can be found in our comprehensive service catalog.



Would you like to receive our service catalog or a specific pentest quote?
Get in touch with us!

Ihre Daten wurden übermittelt.

Unser Team wird sich so schnell wie möglich bei Ihnen zurückmelden.


Why pentesting?

Pentesting is a continuous cycle that follows a company. New vulnerabilities can appear anywhere and at any time. The constant development in the security sector requires a recurring review of the IT system landscape. In addition, the human factor can also represent a major security gap. 


People remain a central component of many security vulnerabilities. As part of penetration tests, we not only examine technical vulnerabilities, but also the security of your employees when dealing with digital threats. 

Controlled phishing and spear phishing campaigns allow us to simulate real attack scenarios in order to measure and strengthen security awareness in a targeted manner. In this way, we identify weaknesses in processes and communication channels – before a real attacker does.


In addition, you will gain more clarity about the security of your company in the event of an attack. Important requirements from frameworks (e.g. CIS Control 18) and regulations (e.g. NIS2 and DORA) are also addressed.


The pentest makes it possible to obtain a detailed picture of the digital attack surface. The result can serve as a basis for investment decisions and thus investments can be made in a targeted manner. 

Pentesting procedure


1 |

Kick-off meeting

Analysis of the status quo, our team agrees the aim and scope of the pentest with you.

| 2

Reconnaissance / Intelligence Gathering

Information gathering; the aim is to obtain a complete overview of the digital attack surface.

3 |

Vulnerability Assessment

We carry out scans and check the identified vulnerabilities.

| 4

Exploitation

The actual attack on your IT system begins. The previously identified vulnerabilities are actively used to penetrate the system broadly and gain extended rights.

5 |

Report & Documentation

The vulnerabilities found are classified according to their risk and a catalog of measures is drawn up to eliminate the security issues.

What do you get at the end of the assessment?


 Detailed overview of your vulnerabilities (including software, configuration and design)

 Tried and tested recommendations for suitable preventive measures

Benefits of our pentesting reports


 Clearly structured and concise scope

 Intuitive structure for quick orientation


​ Concise management summary for decision-makers


 No standard reports – created individually and manually


 Available in German or English – depending on individual requirements


 Segmentation, e.g. by location or business unit


 Specific, actionable recommendations for each weak point


 Flexibly expandable according to individual requirements

Pentesting without pentesters?

In contrast to manual tests, autonomous pentesting runs continuously, automatically and without external pentesters. Security gaps are quickly identified, prioritized and rectified - ideal for bridging the gap between classic pentests. In this way, you constantly minimize your attack surface and are faster than the attacker.




Can we assist you?

Our experts are happy to support. Get in touch with us!