Penetration Testing Methodology
1) Scoping & Rules of Engagement
- Define scope, objectives, constraints, and testing windows.
- Legal agreements and authorisations (RoE, NDA, emergency contacts).
2) Recon & Threat Modelling
- Passive/active enumeration, OSINT, attack-surface mapping.
- Threat modelling for critical roles/data/processes.
3) Exploitation & Lateral Movement
- Controlled exploitation (OWASP Top 10, misconfigurations, privilege escalation).
- Realistic attack chains and impact proof.
4) Reporting & Remediation
- Technical + executive report, reproducible evidence, CVSS, and business risk.
- Remediation plan and validation re-test.
Test areas and types
Web App / API: injection, authz/authn, sessions, file upload, SSRF, IDOR.
Mobile (iOS/Android): reverse, hooking, storage, MITM, jailbreak/root detection.
Internal/External Infrastructure: AD, SMB/RPC, VPN, segmentation, hardening.
Wireless / IoT: WPA/WPA2/WPA3, rogue AP, BLE, device hardening.
Cloud: identity, IAM, buckets/object stores, secrets, CI/CD, Kubernetes.
Social Engineering*: targeted phishing, vishing, physical walkthrough (on request).
*Physical social-engineering activities require explicit authorisations and stricter operational constraints.
Deliverables
- Technical report with proof-of-concept, CVSS, and business impact.
- Executive summary for management and a risk/priority matrix.
- Remediation guidance with references (CIS, OWASP, NIST).
- Re-test to verify fixes within an agreed window.
Frequently asked questions
Is a VA (Vulnerability Assessment) the same as a Pentest?
No. A VA is scanning/automated analysis with limited verification; a Pentest includes controlled exploitation and realistic attack chains.
Do we need downtime?
Generally no: we test in agreed windows with traffic limits. Potentially intrusive steps are scheduled at low-impact times.
What documentation will we receive?
Technical report, executive summary, vulnerability list with CVSS, remediation plan, and a test attestation.
Which standards do you follow?
OWASP, PTES/OSSTMM, NIST SP-800 series, and vendor best practices (Microsoft, AWS, Google Cloud, Apple/Android).
Ethical & legal disclaimer. Activities are performed only with written authorisation, in agreed environments and scope,
in compliance with applicable laws and the rules of engagement. We do not perform or support unauthorised access.