Penetration testing (pentest)

Comprehensive penetration testing to identify vulnerabilities
in IT infrastructure

Penetration testing (pentest)

>200

completed projects

5 years

average experience of specialists

Three common vulnerabilities and risks

founded and registered in 2024

Why is testing conducted?

Building effective cybersecurity

Compliance with Russian standards and laws (GOST 57580, Central Bank Regulations, 152-FZ, 187-FZ)

Elimination of consequences and prevention of information security incidents

What is tested

How many vulnerabilities did we find?

The statistics are based on the last 100 projects of various types: external perimeter penetration testing, internal infrastructure penetration testing, web applications, mobile applications, APIs, and specific protocols.

Perform a system penetration test

Penetration testing tools

While working on projects, we often create our own tools: we write scripts, exploits, and automate routine tasks for a specific project.

Reconnaissance and information gathering

  • BBOT, ReconFTW, Amass
  • Gitleaks
  • Wappalyzer
  • Shodan, Censys

Detailed review and manual analysis

  • Burp Suite, Postman, cURL
  • Metasploit
  • Linux console utilities
  • Python/Bash/JavaScript

Universal vulnerability scanners

  • Nmap
  • Burp Suite
  • Nuclei

We use all testing methods.

“Black Box” – the pentester has no prior information about the system.
“Grey Box” is a method that combines elements of BlackBox and WhiteBox testing. The pentester has some prior information about the system, but not complete, or has an account.
WhiteBox is a method in which the pentester has full access to the source code and system configuration. This allows them to perform a detailed analysis and find vulnerabilities that cannot be detected by other means.

The testing methodology is agreed upon with each customer individually. However, it is always based on industry best practices, standards, and guidelines, such as NIST SP800-115, WSTG (Web Security Testing Guide), OSSTMM (Open Source Security Testing Methodology Manual), and others.

What is included in the test report

For each type of testing, a detailed report is created, which describes in detail:

All vulnerabilities found

Possible attack vectors, supported by screenshots

Recommendations for eliminating vulnerabilities

The report structure includes three sections that will be useful for:

Information security professionals

Customer company management

IT specialists

Sample report in PDF

Stages

  1. Preliminary stage and passive reconnaissance

    Gathering information from open sources

  2. Scanning and active reconnaissance

    Thorough scanning of customer resources using automated tools

  3. Detailed analysis of resources and manual analysis

    This stage reveals the largest number of vulnerabilities. Manual testing expands the scope of work and identifies logical vulnerabilities that are difficult to detect with automated tools

  4. Exploitation

    Findings from all previous testing stages are used to simulate attacks by real attackers and gain unauthorized access to resources.

  5. Documentation and reporting

From 450,000 ₽

From 20–25 business days

Pricing is determined individually based on your scope, IT infrastructure, and tasks. The cost of services depends on the complexity and volume of work, and we are always ready to offer you the most favorable terms based on the price/quality ratio.

Advantages of working with us

Our own team

We are always in touch and respond quickly to all questions

Specialized company providing full-cycle information security services
You can monitor identified vulnerabilities in a special panel

Our clients

FAQ

Penetration testing is a method of checking the security of information systems and applications using approaches and tools similar to those that attackers might use. Its main purpose is to identify vulnerabilities and provide recommendations for eliminating them.

Penetration testing is performed by information security specialists who are proficient in professional tools and techniques.

There are two main types of testing:

  • External penetration testing simulates the actions of an external attacker attempting to penetrate the system via the Internet.
  • Internal penetration testing assesses the risks posed by insiders who have access to the infrastructure.

The result of the work is a report listing the vulnerabilities found, ways to exploit them, and recommendations for elimination. The document also includes a description of the tests performed and the methods used.

Important: penetration testing is only carried out with the permission of the system owner and in strict compliance with the law.

Continuous Penetration Testing (CPT) is a continuous penetration test that is conducted on an ongoing basis. It allows you to quickly identify new vulnerabilities and respond quickly to changes in infrastructure and attack methods.

Features of CPT:

  • Continuous testing instead of periodic checks.
  • Use of automated tools for monitoring and analysis.
  • Quick response to updates and changes in systems.
Pentesting is a practical check of the security of a system at a given moment in time, simulating real attacks. An information security audit is a broader process aimed at comprehensively assessing and developing information security policies and data protection processes.
Vulnerability scanners automatically detect basic problems in the system, but do not assess how they can be exploited by an attacker. A pentest, on the other hand, involves realistic attack simulation, assessment of the criticality of the vulnerabilities found, and the development of practical recommendations for their elimination.
Security analysis aims to find all possible vulnerabilities. At this stage, the problems found are not exploited. Penetration testing, on the other hand, involves attempts to exploit vulnerabilities and demonstrate potential consequences.
  • Black Box: testing without access to internal information. An attack from outside is simulated.
  • Grey Box: specialists have limited data (for example, an account without privileges). Allows you to focus on critical points.
  • White Box: full access to architecture, code, and internal systems. Used for comprehensive testing and analysis of operating logic.
  • At least once a year;
  • When updating or scaling infrastructure;
  • When launching a new IT landscape or changing the security perimeter.
  • Compliance with standards and regulatory requirements (PCI DSS, GOST R 57580, 719-P CB RF, etc.);
  • Prevention of incidents;
  • Verifying the effectiveness of existing security measures;
  • Identifying and eliminating vulnerabilities;
  • Assessment of security management processes;
  • Justification of investments in information security;
  • Preparation for possible attacks.
  • Banks and financial institutions — in accordance with the Regulations of the Bank of Russia.
  • Critical information infrastructure (CII) entities — in accordance with FSTEC Order No. 239.
  • Any companies interested in an objective assessment of their level of security and prevention of reputational and financial losses.

Related solutions

Useful articles