Penetration Testing

Penetration Testing

Penetration testing is conducted to verify security of a targeted asset such as network, web, mobile or client-server application.

Cybersecurity testing

It is one of our core services, we have many years of experience in performing penetration testing and until now we have delivered several hundred tests to our customers. All pentesters performing testing hold multiple certificates e.g. OSCP (Offensive Security Certified Professional) and have a proven track record in the industry. We fulfill the formal requirements often required by customers in terms of delivering a penetration test such as PCI DSS Penetration Testing Guidance. All reports are written by our consultants and not thoughtlessly generated by automatic security scanners. Additionally our pentesters have identified many vulnerabilities in popular software and successfully participated in bug bounty programs.

Why us?

We are experienced professionals who worked in well known companies on top technical positions of cybersecurity, which include i.a. The Royal Bank of Scotland and one of the Big Four company Deloitte. We performed literally hundreds of pentests so far. Our customers include financial institutions such as international banks, exchanges (also cryptocurrency exchanges), credit card factory and other critical infrastructure units such as medical institutions and critical government applications used by European Union citizens every day. Our experience is not only related to most critical systems but also common e-commerce companies, such as big international online shops, lottery applications and startups.

Each of our pentesters has real senior level experience in penetration testing. Our work is mostly performed using manual testing approach, we do not only use automatic scanners but incorporate real attack techniques that could be used against an organisation. Our reports are written by hand, not auto generated by tools. These are the reasons why many known companies trusted us, which is confirmed by our references. Our experience was also appreciated by law enforcement and justice authorities which results in having IT Expert Witness (court expert, whose opinion is accepted by the judge as an expert) status in Poland, especially in cybersecurity.

We not only have professional experience but also many personal achievements in well known companies bug bounty programs such as Adobe, Apple, BlackBerry, Google, Microsoft, Netflix, Nokia and VMware. Pawel Wylecial is the co-founder and organizer of a international IT security conference WarCon, which is appreciated in international offensive security industry.

What also make us stand out is that we not only have offensive security experience but also wide defensive security knowledge. Adam Ziaja is a co-author of many European Network and Information Security Agency (ENISA) publications on the subjects of digital forensics, incident response and threat intelligence, author of “Practical computer forensics analysis” book. He was also a member of the team that won largest civilian exercises about protecting cyberspace – ENISA Cyber Europe 2014. All our experience allows us to have a wider view on cybersecurity, we have knowledge from a technical perspective on how hackers operate and what are the biggest cybersecurity threats for today’s world. We use this knowledge with responsibility to help organizations, i.a. by frequently speaking at the international scientific conference “Technical aspects of ICT crime” (TAPT) organized by Polish Police Academy.

Black box penetration testing

Both infrastructure and application pentesting can be performed from a outside attacker perspective meaning that the tester does not hold any knowledge regarding the targeted system apart from those available publicly. No information about the architecture and customer systems is delivered, no user accounts except those that can be created by an attacker (e.g. by registering in the application). Usually when conducting a security audit of a web application we use a gray box approach, which gives us some information about the audited system (e.g. documentation, description of the system functionalities) and accounts for each role in the systems are delivered, so we are able to check both vertical and horizontal privilege escalation, meaning accessing data and/or functionalities of higher privileged user and a different user with same or similar access rights.

White box penetration testing

This type of a security audit is an extended version of gray box pentesting in which testers have full knowledge of the targeted asset. In case of a web application we are given access to both documentation and the source code additionally to what is granted in a gray box test.

Web application penetration testing

We deliver web application penetration testing in accordance with popular and widely accepted OWASP methodology (The Open Web Application Security Project), including OWASP Top 10 and OWASP ASVS (Application Security Verification Standard) extended by our experience. We do not limit ourselves only to OWASP listed vulnerabilities and aim to find also business specific vulnerabilities that can pose a real threat to the business of the customer and which are often missed by automated vulnerability scanners.

Software penetration testing

We deliver desktop application penetration testing and client-server application penetration testing. We can cover security testing of applications written in C/C++/C# and Java for Windows, Linux and OS X platforms.

Mobile application penetration testing

We perform mobile application penetration testing for iOS and Android platforms. We base our methodology on OWASP Mobile (The Open Web Application Security Project), including OWASP Mobile Top 10 and OWASP MASVS (Mobile Application Security Verification Standard) enhanced by our own experience in identifying vulnerabilities in mobile application.

Infrastructure penetration testing

We perform penetration testing of network infrastructure (LAN/WAN/WLAN), according to the PTES framework (The Penetration Testing Execution Standard). Tests can be conducted from both external (Internet, Wi-Fi etc.) and internal (LAN, VPN) networks.

LAN Network penetration testing

Security audit of a local network can be performed locally on premises or via VPN. The difference compared to infrastructure pentesting is that the pentester is given access on the level as if the intruder already gain access to the company internal network or it simulates a rogue employee trying to do harm from the inside.

WiFi penetration testing

WiFi penetration testing aims to test the security of locally deployed wireless networks. It aims either to break into a protected WiFi network as well as privilege escalation from a guest network and attacking the users.

Wireless security is also a part of our red teaming services which aims to perform social engineering attacks against unsuspecting WiFi users, for example by running a rogue AP (Access Point).


Our team holds the following certificates in the field of penetration testing and cybersecurity:

  • Offensive Security Certified Professional (OSCP) – entire pentesters team
  • Offensive Security Wireless Professional (OSWP)
  • Offensive Security Certified Expert (OSCE)
  • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
  • eLearnSecurity Web application Penetration Tester (eWPT)
  • eLearnSecurity Web application Penetration Tester eXtreme (eWPTX)
  • eLearnSecurity Mobile Application Penetration Tester (eMAPT)
  • Certified Ethical Hacker (CEH)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Auditor (CISA)

Penetration testing pricing

Cost of a penetration test depends mainly on the scope size and the complexity of work required. Price also differs for remote and local engagements as the latter require additional travel and accomodations costs depending on the location. To get a quote please contact us.

Penetration testing according to PCI DSS

We fulfill the Penetration Testing Guidance requirements and perform penetration testing based on PCI Data Security Standard (PCI DSS) recommendations.

Explore Our Offer

We deliver advanced technical consulting services covering multiple aspects of cybersecurity from red team to blue team. Thanks to a diverse experience in IT security we are able to look at a wider perspective during engagements. Our abilities come from many years of work experience in cybersecurity and are confirmed with certificates, publications, advisories and references from our customers.

See the Competences of Our Team

We found and responsibly disclosed multiple vulnerabilities in high-profile software from major vendors such as: