Penetration Testing
Adversary-Perspective Security Testing — Every Critical and High Finding Actually Exploited, Not Theorized
Penetration testing is adversary-perspective security assessment — testing your environment the way an actual attacker would, not the way a scanner does. Every Critical and High finding is demonstrated through actual exploitation, not inferred from version numbers or configuration checks. The result is proof, not probability.
Engagements cover External Network, Web Application, API, Cloud Infrastructure, Internal/Assumed Breach, and Social Engineering testing types. Findings are scored with CVSS v3.1 and mapped to MITRE ATT&CK techniques, producing an attacker narrative that doubles as SOC detection gap analysis. Your blue team gets the attack chain; your engineering team gets the fix.
The same practitioner who scopes the engagement conducts the testing and delivers the report. No handoff between sales and technical staff. Remediation retest of all Critical and High findings is included within 90 days at no additional cost.
Who This Is For
Ideal clients for this engagement.
The Problem
What this engagement addresses.
Scanner-Only Testing Misses Real Exploitability
Automated scanners produce vulnerability lists ranked by theoretical severity. Without manual exploitation, you cannot distinguish a true Critical from a false positive or a mitigated risk — and you waste remediation cycles on findings that do not matter.
Fragmented Testing Engagements
Many penetration testing firms hand off scoping to one team, testing to another, and reporting to a third. Context is lost at every transition. Findings lack the attacker narrative needed for meaningful remediation prioritization.
No Detection Gap Visibility
Traditional pen test reports list vulnerabilities but do not map the attack chain to detection capabilities. Security operations teams receive no actionable input on where their monitoring failed to detect the simulated attack.
Retest as Upsell
Many firms treat remediation retesting as a separate engagement with separate scoping and billing. This creates a disincentive to verify that fixes actually work and leaves organizations uncertain about their remediation effectiveness.
Deliverables
What you receive.
Technical Findings Report
Each finding with CVSS v3.1 score, MITRE ATT&CK technique mapping, exploitation proof (screenshots, request/response pairs, command output), business impact analysis, and specific remediation guidance. Findings prioritized by exploitability and impact, not scanner severity alone.
Executive Summary
Non-technical summary for security leadership and executive audiences. Overall risk posture, top findings with business impact in plain language, attack chain narrative, and strategic remediation priorities.
Attacker Narrative & Detection Gap Analysis
End-to-end attack chain documentation mapped to MITRE ATT&CK. Each step annotated with whether existing detection and monitoring capabilities triggered alerts. Directly usable by SOC teams for detection engineering and tuning.
Remediation Retest Report
Verification of all Critical and High finding remediations within 90 days. Each finding marked as resolved, partially resolved, or unresolved with updated evidence. Delivered as an addendum to the original report.
Methodology
How the engagement works.
Scoping & Rules of Engagement
Days 1 – 2
- Target scope definition and testing type selection
- Rules of engagement and communication protocols
- Credential and access provisioning for authenticated testing
- Testing schedule alignment with change windows
Reconnaissance & Testing
Weeks 1 – 3
- OSINT and external reconnaissance
- Manual vulnerability discovery and exploitation
- Privilege escalation and lateral movement testing
- MITRE ATT&CK technique mapping throughout engagement
- Real-time Critical finding notification
Reporting & Debrief
Within 5 business days of test completion
- Technical findings report with exploitation proof
- Executive summary delivery
- Attacker narrative and detection gap analysis
- Live debrief with engineering and security teams
Remediation Retest
Within 90 days of report delivery
- Retest all Critical and High findings after remediation
- Updated evidence for resolved and unresolved findings
- Retest addendum report delivery
Engagement Tiers
Scoped to your architecture.
Focused
Single target type — one external network range, one web application, or one API. Suitable for targeted pre-release testing or compliance-driven assessments.
- Single testing type (External, Web App, or API)
- CVSS v3.1 scoring and ATT&CK mapping
- Technical findings report and executive summary
- Remediation retest within 90 days
Standard
Multi-target engagement combining 2-3 testing types. Covers the most common attack surface for organizations with web applications and supporting cloud infrastructure.
- Everything in Focused
- 2-3 testing types combined
- Attacker narrative with detection gap analysis
- Cross-target attack chain documentation
Comprehensive
Full-scope engagement across multiple testing types including internal/assumed breach or social engineering. For organizations requiring thorough adversarial assessment across their environment.
- Everything in Standard
- 4+ testing types including internal or social engineering
- Extended reconnaissance and lateral movement testing
- SOC coordination for detection validation
Prerequisites
- Defined target scope (IP ranges, URLs, application environments)
- Signed rules of engagement and authorization letter
- Test credentials for authenticated testing types
- Emergency contact and escalation procedures
Frequently Asked Questions
Common questions.
How is this different from a vulnerability scan?
A vulnerability scan is automated tool output — it identifies potential vulnerabilities based on signatures and version checks. Penetration testing is manual, adversary-simulated exploitation. Every Critical and High finding is actually exploited and demonstrated with proof. Scanners guess; pen testers prove.
What happens if you find a Critical vulnerability during testing?
Critical findings are reported in real time through the agreed communication channel — typically within hours of discovery. You do not wait for the final report to learn about exploitable Critical issues. Testing continues in parallel so the engagement timeline is not disrupted.
Is the remediation retest really included?
Yes. Retest of all Critical and High findings within 90 days of report delivery is included in every engagement. No separate scoping, no additional contract. The same practitioner who found the issues verifies the fixes.
Related Offerings
Often paired with this engagement.
API Security Assessment
Deep-dive manual API testing beyond standard pen test scope — OWASP API Top 10, authorization model review, and business logic testing.
Secure Code Review
White-box complement to penetration testing — find vulnerabilities at the source code level that black-box testing cannot reach.
Threat Modeling Workshops
Proactive threat identification before testing — define the threats your architecture faces and focus testing on what matters most.
Pipeline Security Implementation
Harden the software supply chain that produces the applications under test — artifact signing, SBOM, and admission control.
Ready to discuss this engagement?
30-minute discovery call. We will discuss your application architecture, your specific concerns, and whether this assessment is the right fit.
