top of page

Penetration test

/ˌpɛ.nɪˈtreɪ.ʃən tɛst/ 

1. A penetration test, also known as a pentest, is a controlled cyber attack on IT systems with the aim of finding weak spots and improving your security.

Our experts use techniques that real hackers also use. We combine automated tools with manual tests to thoroughly investigate how well your networks, applications and systems are protected.

video Game

Training Content

In this training we dive into common vulnerabilities and learn how to recognize, abuse and prevent them.

 

We cover, among other things:
 

  • OWASP Top 10
    The most critical security risks with real-world examples and prevention strategies.
     

  • Path Traversal
    How attackers gain access to sensitive data through file structures and how to prevent this.
     

  • Server Side Request Forgery (SSRF)
    Manipulating server requests to access internal systems, including mitigation techniques.
     

  • Command Injection
    Executing unauthorized commands on the server and ways to protect your application against it.
     

  • LLM Injection
    How AI-driven systems can be manipulated and what measures you can take to prevent abuse.

 

After completing this training, you will not only have insight into the origins of these vulnerabilities, but also into ways to structurally prevent them.

What can you expect?

1. Preparation

Together we determine which systems, applications or networks will be tested and we establish clear goals that match the needs and risks of your organization.

2. Reconnaissance and Attack

We collect information to understand how your systems are working. With this information, we perform targeted attacks, similar to how a malicious hacker would operate. This way, we identify weaknesses and risks.

3. Reporting

You will receive a clear and detailed report with our findings. This not only describes the vulnerabilities, but also practical recommendations to solve them. Would you like a sample of our report in advance? That is possible!

4. Debriefing and Support

Results can be technical. We help your team understand the results and how to fix them. We also perform a free audit test to verify that findings have been resolved.

Why choose Security.Rocks?

image.png

Expertise

At Security.Rocks you will work with OSCP-certified experts with a strong technical background and more than 8 years of experience in cybersecurity with clients in various sectors.

multimedia

Customised collaboration

We believe in close collaboration to perfectly align the goals and approach of the pentest with your needs and challenges.

Empty Fish Bowl

Transparency

No hidden costs or unexpected surprises. We work with fixed prices and time limits, including free control tests to verify that the findings of the pentest have been resolved. So you know where you stand.

Want to know more?

Make an appointment for a no-obligation quote or customized advice.

bottom of page