What actually is a pentest?
Do you want to perform a penetration test? Here you can find out everything you need to know about it: Which areas can be tested by a penetration test, when it...
Our certified pentesters and IT security professionals check your IT systems from the perspective of an attacker and hacker. A penetration test is one of the most effective ways to thoroughly check your own IT security and to eliminate the detected security gaps.
With our penetration tests and security audits, Redlings reliably identifies security vulnerabilities that put our customers at risk. Benefit from our experienced penetration testers.
Over many years, our pentest experts have gained experience in performing technical security audits and penetration tests. Ongoing training and qualifications ensure that they are always up to date with the latest the latest attack techniques.
Redlings is a EU/Germany-based company specializing in penetration testing.
Ensure your defenses are up to current threats. With our manual deep-dive engagements, we identify security vulnerabilities security vulnerabilities that put customers at risk. Through our Continuous Collaborative Testing service offering, we take a long-term security approach and work with our customers to ensure that their security posture is constantly improving.
Are important patches missing or are applications and operating systems not hardened? If your pentesters can show that applications and network areas with good implementation have fewer security vulnerabilities, this often has the effect of motivating them to follow the security guidelines.
Penetration tests attack your network and web applications like a hacker would - but without causing any damage. This allows you to find and fix vulnerabilities before the attackers do.
Investments in security measures should always be supported with concrete evidence to demonstrate the value to the business. By showing your leadership team the value of an investment, you can justify your need for more resources
.The results of a pentest support the own team - e.g. system admins - to avoid some error sources in the future. A penetration test can reveal errors in configuration and programming.
With a penetration test you can determine which existing vulnerabilities have the greatest impact on your web applications and network. on your web applications and network. Use your resources and time more efficiently.
Penetration testing gives you unvarnished feedback on the possible consequences of an IT security incident such as a ransomware attack.
Our pentesters are certified experts in their field and often uncover ways in which existing (and paid for) security technologies can be better leveraged and protective efficacy enhanced.
Company and customer data is considered the lifeblood of a business and can be extremely damaging in the wrong hands. With a pentest, your company can better protect its data assets and, if possible, prevent attacks.
Regulations such as PCI-DSS, but also ISO 27001/2 and others, may require regular penetration tests. Some contractual regulations may also contain such a requirement.
The project schedule is planned and prepared during the joint kick-off meeting. Among other things, the following points will be discussed:
Now the security test takes place. Here, it usually consists of one (or more) commissioned test modules.
The test results are compiled in a report. This will include, among others, the sections listed below:
The penetration test and its result are discussed in a final meeting with all parties involved. We understand very well that the discovered and documented security vulnerabilities are only the first step. Concrete measures for the improvement of IT security must be derived and also implemented.
Check what damage hackers can do to you with a penetration test.
As a pentester and ethical hacker, we emulate attacks on corporate IT using the same tools and methods that criminal organizations use every day in Kassel, Germany, Europe and worldwide.
A penetration test, or "pentest" for short, is a security check that emulates an attack by a malicious party on a network or application to identify security vulnerabilities. This test is coordinated in advance and conducted in such a way that no system is damaged. At the end of the test, you will receive a report that includes the problems and vulnerabilities found, along with suggestions on how to fix them.
This can vary - depending on the type of pentest. However, the following points are often part of the scope or the mutually reached agreement:
- Target systems (IP/host name) or IP address spaces
- Test periods as well as contact persons
Cloud providers such as AWS, Azure, and Google have provided blanket consent forms for certain areas, but this may vary by provider.
In principle, one must be available if the systems to be tested are not on your own infrastructure.
It is often useful to involve the system managers concerned in the planning process at an early stage
so that the "pentest" is not perceived as an attack but as a potential analysis for improving IT security.
To be honest, we are not interested in showing that we can hack a company,
but to uncover potential for improvement in the IT landscape in a collaborative working atmosphere,
deriving and prioritizing measures and improving IT security as effectively and efficiently as possible.
An IT security audit examines the security of a company's IT systems from a holistic perspective. Security threats can arise not only from attacks, but also from technical incidents, organizational deficiencies or force majeure.
Security audits often take place as part of an ISMS (information security management system) and examine not only technical security elements but also compliance with the company's own standards and guidelines, security processes, employee training (keyword information security awareness) and similar aspects.
Some security audits also include elements of a vulnerability scan.
However, a security audit usually does not go into as much technical detail as a manual penetration test.
In black-box testing, the pentester attempts to attack the target without any prior knowledge of addresses, systems, applications and processes. The main argument for this approach is that this scenario comes closest to the real world and thus simulates a real attack scenario. However, this is only partially true because a real attacker does not have just a week or two like a contracted pentester, but has the entire time, including months or years, to prepare the attack. In fact, some of the most successful hacker attacks have taken place over a period of up to 12 months.
This bias means that black-box testing is often inconclusive and gives customers a false sense of security. Redlings therefore recommends black-box testing only in exceptional cases. The argument that attackers (must) implement a black-box approach also only works to a limited extent, since a long preparation time can lead to extensive internal informtions.
As with any business service, the cost of a penetration test varies significantly depending on several factors.
significantly depending on several factors.
Scoping details such as network IP addresses, complexity and number of (web) applications and employees
for social engineering are key factors in determining project size.
Taking these variables into consideration, our team works diligently to,
align the scope details with your organization's security requirements.
Nevertheless, some empirical values that can serve as an initial guide can be mentioned.
A high-quality, professional pentest performed by experts usually costs
usually from about €10,000, but can be for large projects
also significantly above this amount.
Redlings also offers discounts for multi-year contracts ("continuous pentesting") to ensure,
that your company has a consistent pentesting partner, and can
can stretch the security budget further.
One question that is not asked often enough is how much of the testing is automated
and how much is manual. Automated tools, especially at the beginning of a project, can save
save a pentester a lot of time and their use also depends on the project.
However, experience shows that about 90-95% of the pentest is "manual work".
This is not to say that automated vulnerability scanners do not add value;
Vulnerability scans are quick and easy tools that should be used on a regular basis to
should be used to identify missing patches or outdated software in larger environments.
Do you want to perform a penetration test? Here you can find out everything you need to know about it: Which areas can be tested by a penetration test, when it...
Why is Cyber Security so important? Attackers and defenders - when does the cat-and-mouse game end? What measures should you take now to protect yourself from...
A network penetration test is a security assessment for your organization's internal or external IT infrastructure and exposed network services.
Read MoreWe examine your web applications and web servers for vulnerabilities.
Read MoreCloud Penetration Testing is a security assessment of one or more systems in a cloud environment (e.g. AWS, Azure, GCP).
Read MoreAssess the effecitvness of your prevention, detection and response capabilities against common adversarial tactics.
Read MoreAn Active Directory Security Assessment includes a forest and domain trust configuration and security review as well as an assessment of conrols for administrative groups and privileged access accounts.
Read MoreAssess your organisation's threat detection and response capabilities using a emulated cyber attack.
Read MoreThe Redlings Vulnerability Assessment Service helps you better understand and manage your organisation's cybersecurity risks by providing assistance in identifying, classifying and mitigating them.
Read MoreA Social Engineering Security Assessment may range from simple email phishing to sophisticated campaigns using multiple communication techniques including spearphishing, vishing and on-site engagement.
Read MoreRedlings provides organizations with top-notch security experts who have years of experience building and running information security programs.
Read MoreOur GRC experts can provide you with assistance delivering your information security project.
Read MoreOur goal is to ensure that your company has fully integrated 'security-by-design' right from the start of the project.
Read MoreOur security experts will infuse security policies, tooling, and practices into your DevOps environment.
Read More