External and internal network pentesting that exposes real attack paths — and produces the independent security evidence your regulators, auditors, and certification bodies require.
request a quoteNetwork penetration testing is one of the most explicitly mandated requirements across major compliance frameworks. Despite this, many organisations treat network security as a solved problem — firewalls are deployed, VPNs are in place, policies are written. The reality is that networks accumulate technical debt: forgotten services on non-standard ports, legacy systems with unpatched CVEs, overly permissive firewall rules configured "temporarily" years ago, and flat internal architectures where a compromised workstation can reach a domain controller without restriction. Our testing surfaces these gaps in a format your engineers can act on.
Full attack surface mapping of all internet-facing infrastructure: port scanning, service fingerprinting, CVE identification in exposed services, exploitation of internet-facing admin panels, remote desktop (RDP), SSH with weak authentication, and legacy protocols (SMBv1, SNMPv1/v2 with default community strings, Telnet).
Simulates an insider threat or a post-breach attacker who has gained a foothold inside your network. We test for Kerberoasting, AS-REP Roasting, Pass-the-Hash, Pass-the-Ticket, NTLM relay attacks, DCSync, and privilege escalation paths to Domain Admin — using BloodHound-based Active Directory attack path mapping to visualise the full chain.
Network segmentation testing verifies that zones expected to be isolated actually are — a specific requirement under PCI DSS (cardholder data environment segmentation validation) and DORA (operational resilience boundary testing). Every finding in our report is mapped to the relevant compliance controls, so your security team and your auditors work from the same document.
We define in-scope IP ranges and map testing objectives to the specific compliance frameworks in play. Rules of engagement are agreed in writing before testing begins.
Passive and active enumeration of in-scope IP ranges, exposed services, open ports, and running protocols.
Risk-ranked findings with network topology annotations, attack chain diagrams, and control mapping to your specific compliance frameworks. Report format suitable for auditor submission.
Our network assessment covers the five technical control areas verified in Cyber Essentials Plus: boundary firewalls and internet gateways, secure configuration, access control, malware protection, and patch management. We can produce a supporting evidence package aligned to the CE+ assessment scope. Note that formal CE+ certification requires an IASME-accredited assessor — we work alongside your certifying body or can recommend one.
External testing simulates an attacker on the internet with no prior access. Internal testing simulates a post-breach attacker or insider threat who has already gained a foothold and is moving laterally through the network.
Not necessarily. Internal testing can be performed remotely via VPN access with appropriate controls in place.
We coordinate with your team to avoid testing during business-critical periods. Most tests are non-disruptive. Aggressive techniques (live exploitation of production systems) are agreed in writing in the rules of engagement before testing begins.