
11
Penetration Testing
Key Facts
- Web Application/Network Pentest
- Pentest of Mobile Apps (Android, IOS), Webapps, Software, Hardware
- Pentest of internal networks/Active Directory/Cloud-Environments
Categories
Application security Hardware security Mobile security Network security Physical IT-security Web application security Cloud (computing) security Endpoint security Penetration tests APT protection Counter-intelligence Threat analysis Awareness Education / training / qualification Consulting IT security
Product information
Penetration Testing – manual, realistic, and transparent. We identify exploitable vulnerabilities before others do, prioritize risks by business impact, and deliver concrete, actionable fixes — not a scanner report, but real attack paths and clear remediations.
Service components:
• Web, APIs, and microservices - OWASP Top 10–based, AuthN/AuthZ, business logic, file uploads, GraphQL, OAuth/OIDC, SSO, rate limiting, API abuse
• Mobile apps (iOS/Android) - MASVS/MSTG–based, app–API coupling, data storage, transport, jailbreak/root robustness, hardening/obfuscation
• External & internal networks o Perimeter checks, segmentation, attack paths, AD/Entra ID hygiene, privileged escalation, exposure analysis
• Cloud & containers - Azure, AWS, GCP ...