Penetration testing is a comprehensive examination of your IT systems and networks by experienced security experts. Over a limited period of time, they use techniques that professional cyber criminals use in their attacks to uncover vulnerabilities.
Initial overview of systems and vulnerabilities
Targeted attacks on individual systems
Identification of improvement potential for existing protection systems (AV, EDR, firewall, IPS/IDS)
Documentation on the fulfilment of certain security standards
Unlike automated inspections, penetration tests analyse IT infrastructures from the perspective of a human attacker. The major advantage of this: our penetration testers know the attack methods and use their knowledge to find out how existing security measures can be circumvented.
Testing from the perspective of real attackers
Application of realistic attack methods
Practical examination of current security measures
The results of a penetration test are recorded and described in detail in a final report. The report also contains short and long-term recommendations for remedial action to eliminate any identified security vulnerabilities.
Detailed final report
Including practical recommendations for action
We offer a range of penetration tests for testing different system and application environments.
Web Application Penetration Test for web applications (based on OWASP Top 10)
Mobile Application Penetration Test for iOS and Android applications
Perimeter Penetration Test (external attack via the Internet)
Corporate Net Penetration Test (security scan within a network)
Client-side Penetration Test (attack simulation on a client system, e.g. via e-mail)
Application Security Audit (testing of native applications for the Windows, Linux and macOS operating systems)
Gain an even more detailed insight into the security status of your IT landscape with our pentest packages, which complement each other and provide bundled services.
Vulnerability scan of your internal network with manual verification
Examination of the configuration of the Active Directory for privilege escalation and hardening measures
Scan for outdated protocols, default access data and outdated software
Detailed final report including vulnerabilities and measures
Includes all services from the Bronze package
Detailed analysis of the Active Directory for complex attack paths
Examination of network segmentation and network access controls
Examination of access authorisation for network drives
Perimeter Penetration Test of external infrastructure (e.g. VPN, e-mail, web server)
Concluding discussion of the results based on the final report
Includes all services from the Bronze and Silver packages
Free retest after elimination of vulnerabilities
Client-side Penetration Test of a Windows 10/11 client
Concluding presentation of the results for management and technicians
Details on the scope of services(Download PDF)
Since 2004, 8com has been testing the IT systems of companies and public authorities and supporting them in establishing comprehensive cyber security strategies.
Benefit from the expertise of our OSCP-certified penetration testers who know how cyber criminals operate.
Years of experience in penetration testing
Application of proven concepts
All penetration testers are OSCP-certified
We would be happy to show you how 8com can protect your company.
8com GmbH & Co. KG
Europastrasse 32
67433 Neustadt an der Weinstrasse