Do you want to perform a penetration test? Here you can find out everything you need to know about it: Which areas can be tested by a penetration test, when it...
Penetration Testing Erfurt
Trusted Ethical Hackers Erfurt
Our certified penetration testers and IT security experts test IT security from the perspective and with the means of a hacker. A pentest is one of the most effective ways to put your IT security through its paces and then eliminate the vulnerabilities discovered.
Talk to a certified penetration tester!
+49 621 48 345 010
We can be reached by phone, email or via our contact form.
Your advantages at a glance
With our penetration tests and security audits, Redlings reliably identifies security vulnerabilities that put our customers at risk. Benefit from our experienced penetration testers.
Our Cyber Security Experts
Our IT security experts for penetration testing have many years of experience in conducting security tests. Through regular training and continuing education, they are always up to date.
Who we are
Redlings is a EU/Germany-based company specializing in penetration testing.
Ensure your defenses are up to current threats. With our manual deep-dive engagements, we identify security vulnerabilities security vulnerabilities that put customers at risk. Through our Continuous Collaborative Testing service offering, we take a long-term security approach and work with our customers to ensure that their security posture is constantly improving.
Every Redlings pentest is subject to strict guidelines and ethical principles.
Training of the internal IT team
The results of a penetration test can help your developers and administrators make fewer mistakes. A pentest detects misconfigurations, programming errors and other vulnerabilities.
Implementation of Security Policy
Are important patches missing or are applications and operating systems not hardened? If your pentesters can show that applications and network areas with good implementation have fewer security vulnerabilities, this often has the effect of motivating them to follow the security guidelines.
Priorisierung von IT-Risiken
With a penetration test you can determine which existing vulnerabilities have the greatest impact on your web applications and network. on your web applications and network. Use your resources and time more efficiently.
Konsequenzen eines Understand Cybersecurity Incidents
Penetration testing gives you unvarnished feedback on the possible consequences of an IT security incident such as a ransomware attack.
Detection of vulnerabilities
Penetration tests attack your network and web applications like a hacker would - but without causing any damage. This allows you to find and fix vulnerabilities before the attackers do.
Increase the effectiveness of your security investments
Often, our penetration testers uncover unused potential of existing security technologies. The performance of security systems can often be significantly increased as a result.
Investments in security measures should always be supported with concrete evidence to demonstrate the value to the business. By showing your leadership team the value of an investment, you can justify your need for more resources.
Regulations such as PCI-DSS, but also ISO 27001/2 and others, may require regular penetration tests. Some contractual regulations may also contain such a requirement.
Protect your most important data and the trust of your customers
Company and customer data is considered the lifeblood of a business and can be extremely damaging in the wrong hands. With a pentest, your company can better protect its data assets and, if possible, prevent attacks.
Steps for a Penetration Test
The project schedule is planned and prepared during the joint kick-off meeting. Among other things, the following points will be discussed:
- Reconciliation of contact details
- Test period with start date and end date
- Review of the exact handling and scoope of the pentest
- Technical presentation by the customer (test subject)
- Making technical details available (e.g. documentation of components, accesses)
- Agreement on the environment of the pentest and the exact methodology
Penetration Test Execution
Now the security test takes place. Here, it usually consists of one (or more) commissioned test modules.
- Internal Network Penetration Test
- External Network Penetration Test
- Web Application & Web-API penetration test
- Wifi Pentest
- Active Directory Security Assessment
- Social Engineering
- Red Teaming
- Cloud Penetration Testing
The test results are compiled in a report. This will include, among others, the sections listed below:
- Summary of the results and description of the framework of the project
- Listing and description of security vulnerabilities found with risk assessment and remediation actions
- Proof documentation on the security vulnerabilities, screenshots if necessary
The results of the performed pentest are discussed in a final meeting. We are aware that the aware that the security problems found are only a first step. Concrete follow-up measures to to increase security must be defined and implemented.
Let us advise you free of charge!
Check what damage hackers can do to you with a penetration test.
As a pentester and ethical hacker, we emulate attacks on corporate IT using the same tools and methods that criminal organizations use every day in Erfurt, Germany, Europe and worldwide.
So erreichen Sie uns
A penetration test, or "pentest" for short, is a security check that emulates an attack by a malicious party on a network or application to identify security vulnerabilities. This test is coordinated in advance and conducted in such a way that no system is damaged. At the end of the test, you will receive a report that includes the problems and vulnerabilities found, along with suggestions on how to fix them.
The scope of a penetration test should always be jointly adapted to the specifics of the company as well as the system to be tested.
In the case of a Web application, the scope often consists of the server and operational landscape as well as the user interfaces and APIs. Often, there are enterprise applications that have been specifically was written and that you want to have looked at.
Other considerations also play a role in a network pentest. In particular, the scope you choose should include mission-critical systems that would Could compromise security in the event of a compromise, e.g. because they store sensitive data, such as user information, passwords or customer data.
This can vary - depending on the type of pentest. However, the following points are often part of the scope or the mutually reached agreement:
- Target systems (IP/host name) or IP address spaces
- Test periods as well as contact persons
Cloud providers such as AWS, Azure, and Google have provided blanket consent forms for certain areas, but this may vary by provider. In principle, one must be available if the systems to be tested are not on your own infrastructure. It is often useful to involve the system managers concerned in the planning process at an early stage so that the "pentest" is not perceived as an attack but as a potential analysis for improving IT security. To be honest, we are not interested in showing that we can hack a company, but to uncover potential for improvement in the IT landscape in a collaborative working atmosphere, deriving and prioritizing measures and improving IT security as effectively and efficiently as possible.
As with any business service, the cost of a penetration test varies significantly depending on several factors.
significantly depending on several factors.
Scoping details such as network IP addresses, complexity and number of (web) applications and employees for social engineering are key factors in determining project size. Taking these variables into consideration, our team works diligently to, align the scope details with your organization's security requirements.
Nevertheless, some empirical values that can serve as an initial guide can be mentioned. A high-quality, professional pentest performed by experts usually costs usually from about €10,000, but can be for large projects also significantly above this amount.
Redlings also offers discounts for multi-year contracts ("continuous pentesting") to ensure, that your company has a consistent pentesting partner, and can can stretch the security budget further.
Unlike penetration testing, vulnerability assessment does not determine in detail whether the vulnerability can actually be exploited or what impact it has. A vulnerability scan usually uses automated vulnerability scanners such as Nessus or even Nmap. Vulnerability scanners only cover standard scenarios and do not take into account the specifics of the IT infrastructure in question.
Vulnerability scans are therefore more of a first step in the technical analysis of vulnerabilities than a complete process for securing systems. They are also often used as part of a security audit or as one of the first steps in penetration testing. In all cases, penetration testing goes further and examines the discovered vulnerabilities in detail.
The pentester attempts to exploit the vulnerabilities and assess the resulting opportunities for the attacker. This helps determine the impact of a vulnerability. Due to the manual nature of a penetration test and the creativity of the pentester, the chances of finding serious vulnerabilities are much higher with professionally conducted penetration tests than with standardized vulnerability scans.
Admittedly, this is not so easy - if someone tells you that they only work with the best pentesters, this may be difficult to verify.
that they only work with the best pentesters, it may be difficult to verify.
Pentesters with more experience and more extensive training
are often more expensive. Just remember that you get what you pay for.
Beware of pentesters who offer prices that are too good to be true.
They are probably not doing a thorough job.
I suggest looking for penetration testers who have one or - better - several recognized
Among the most respected (and costly) certifications in security circles in the in the field of penetration testing are the certifications of Offensive Security (esp. OSCP - Offensive Security Certified Professional, OSCE - Offensive Security Certified Expert) and SANS/GIAC.
Webcasts und aktuelle Beiträge
A network penetration test is a security assessment for your organization's internal or external IT infrastructure and exposed network services.Read More
Web Application Penetration Testing
We examine your web applications and web servers for vulnerabilities.Read More
Cloud Penetration Testing
Cloud Penetration Testing is a security assessment of one or more systems in a cloud environment (e.g. AWS, Azure, GCP).Read More
Scenario Penetration Testing
Assess the effecitvness of your prevention, detection and response capabilities against common adversarial tactics.Read More
Active Directory Security Assessment
An Active Directory Security Assessment includes a forest and domain trust configuration and security review as well as an assessment of conrols for administrative groups and privileged access accounts.Read More
Red Teaming & Purple Teaming
Assess your organisation's threat detection and response capabilities using a emulated cyber attack.Read More
The Redlings Vulnerability Assessment Service helps you better understand and manage your organisation's cybersecurity risks by providing assistance in identifying, classifying and mitigating them.Read More
Social Engineering & Phishing Testing
A Social Engineering Security Assessment may range from simple email phishing to sophisticated campaigns using multiple communication techniques including spearphishing, vishing and on-site engagement.Read More
Redlings provides organizations with top-notch security experts who have years of experience building and running information security programs.Read More
Governance, Risk & Compliance
Our GRC experts can provide you with assistance delivering your information security project.Read More
Our goal is to ensure that your company has fully integrated 'security-by-design' right from the start of the project.Read More