Blackfort Technology
Penetration Testing
Offensive Security

Offensive Security

Penetration Testing

We think like attackers – to strengthen your defences. Professional pentests identify security vulnerabilities before real attackers do.

Methodology

Our Pentest Approach

Our penetration tests follow established methodologies – PTES (Penetration Testing Execution Standard), OWASP, and MITRE ATT&CK. We document every finding with a clear risk rating (CVSS), reproduction steps, and concrete remediation guidance. Every engagement produces results that your team can act on immediately.

Each pentest closes with an Executive Summary for management and a detailed technical report for your security team. Following remediation, we offer optional retest services to verify that vulnerabilities have been addressed effectively.

Web Application Pentests

Comprehensive security assessments of web applications following the OWASP Testing Guide. SQL injection, XSS, CSRF, business logic flaws, and authentication vulnerabilities.

  • OWASP Top 10
  • Authentication & session management
  • API security
  • Business logic flaws

Network Penetration Tests

Internal and external network pentests covering Active Directory, lateral movement, privilege escalation, and network segmentation.

  • Active Directory security
  • Lateral movement
  • Privilege escalation
  • Network segmentation

Cloud Security Reviews

Security assessments of AWS, Azure, and GCP environments – configuration errors, IAM vulnerabilities, and data access paths.

  • Azure / AWS / GCP
  • IAM configuration
  • Data exposure
  • Cloud misconfiguration

Social Engineering

Phishing simulations and social engineering tests to assess the human dimension of your security posture.

  • Phishing campaigns
  • Vishing tests
  • Physical security
  • Awareness measurement

Red Team Exercises

Realistic attack scenarios by our Red Team – from initial reconnaissance to simulated data exfiltration, mapped to MITRE ATT&CK.

  • MITRE ATT&CK
  • Persistence & lateral movement
  • Data exfiltration
  • Detection testing

Mobile App Pentests

Security testing for iOS and Android applications following the OWASP Mobile Security Testing Guide.

  • OWASP MSTG
  • Reverse engineering
  • Data storage security
  • Network communication

Process

Our Pentest Process

01

Scoping

Objective definition, Rules of Engagement, timing

02

Reconnaissance

Information gathering and asset discovery

03

Testing

Active security tests and controlled exploitation

04

Reporting

Executive summary and technical detail report

05

Remediation

Fix support and optional retest

Frequently Asked Questions

What is the difference between a vulnerability scan and a penetration test?

A vulnerability scan is an automated process that identifies known weaknesses based on signature databases. A penetration test is conducted by a human tester who actively exploits vulnerabilities to assess their real-world impact. Scans surface the attack surface; pentests prove what an attacker could actually achieve. Both have their place – scans for continuous monitoring, pentests for deep assurance at defined intervals.

How long does a penetration test take?

Duration depends on scope and target complexity. A focused web application pentest typically takes 3–5 days. A comprehensive internal network pentest including Active Directory takes 7–10 days. Red team exercises are scoped over several weeks. We define the timeline precisely during the scoping call – before any commitment.

Do we receive a report, and what does it contain?

Every engagement closes with a comprehensive report. The Executive Summary provides management-level insight into the overall risk posture and critical findings. The Technical Report documents each vulnerability with its CVSS score, proof-of-concept reproduction steps, affected assets, and concrete remediation guidance. After remediation, we offer optional retest services to verify that findings have been addressed.

How does a pentest support ISO 27001 or NIS2 compliance?

ISO 27001 (Annex A control A.8.8) and NIS2 Article 21 both require organisations to identify and address technical vulnerabilities. Regular penetration testing is the most direct way to demonstrate compliance with this requirement. The pentest report serves as documented evidence of a systematic security review – directly usable for certification audits and regulatory inquiries.

How do you handle sensitive data discovered during a pentest?

All findings, including sensitive data accessed during testing, are handled under strict confidentiality. We sign NDAs before any engagement begins. Data discovered during testing is documented in the report but not retained. Our testers operate under defined Rules of Engagement specifying what systems may be tested and what actions are permitted.

Kontakt aufnehmen

Commission a Penetration Test

Talk to us about scope, timing, and budget. We will provide a tailored proposal for your security assessment.