Penetration Testing & IT Security · Specialists in Physical & Social Engineering
Think like an Attacker, Act as a Partner
Your organisation has vulnerabilities you don't know about. Attackers will find them anyway — through technology, deception, and the unlocked door to your server room. We find them first: with tailored penetration tests, clear recommendations, and a focus on physical pentesting and social engineering.
NIS2-compliant
Clear final report
Free initial consultation
Within 22 minutes the testers had access to the server room – no force, no alarm. The report was precise and the recommendations immediately actionable. Rarely seen such professional execution.
★★★★★
The social engineering assessment showed us how vulnerable we really are to phishing. Plain language, no jargon – exactly what our management needed.
★★★★★
Professional execution, clean documentation, and a team that was still reachable after the pentest. Our AD audit uncovered vulnerabilities we had completely missed.
NDA before testing
Clear final reports
Dedicated contact person
Available internationally
Strict confidentiality
PENTEST PROCESS
A commissioned penetration test usually proceeds as follows:
01
Scoping & Target Definition
During an initial meeting, scope, goals, conditions, and technical details of the planned pentest are agreed upon.
02
Offer & Commissioning
Based on the defined scoping, an individual offer is created. After commissioning, project planning begins.
03
Kick-off & Preparation
A kick-off meeting serves to finalise contacts, communication channels, schedule, and any technical prerequisites.
04
Execution of the Pentest
Execution takes place according to the agreed scope – considering the defined systems, scenarios, and any agreed limitations.
05
Customer Communication during Testing
During the testing phase, regular coordination takes place, e.g. for critical findings, questions, or to clarify technical details together.
06
Report & Results Presentation
After completion of the test, a detailed report is prepared. Optionally, a results presentation takes place in a closing meeting.
FAQ
Frequently Asked Questions about Penetration Testing
Costs depend on the scope, complexity of your systems, and chosen test depth. After a free initial consultation you receive a transparent fixed-price offer – no hidden costs. For guidance: a web app pentest typically starts from €2,500, a full physical assessment from €3,500. For combined scope packages (e.g. infrastructure + AD + social engineering) we create individual offers – often cheaper than booking separately.
Depending on the module and scope, the actual testing takes between one and five working days. We communicate critical findings during the test – you are never in the dark. You receive the full final report within five working days of test completion. The entire process from initial consultation to final presentation typically takes two to four weeks. Accelerated timelines are available on request.
Yes. The NIS2 directive requires affected organisations to regularly review their security measures – penetration tests are a central and authority-recognised instrument for this. Our structured, risk-prioritised reports provide the evidence you need for internal and external audits, and help map findings to the NIS2 requirements catalogue.
Absolutely. Before testing begins, we jointly define clear scope boundaries, exclusion zones, and no-go systems. Every activity is fully logged. If unexpected impacts occur, we stop immediately and notify your contact in real time. In well over 99% of all tests there were no operational disruptions whatsoever.
A vulnerability scan is an automated tool that identifies known weaknesses from signatures. A penetration test goes much further: our experts think and act like real attackers, chain multiple vulnerabilities together, and test business logic as well as physical access. The result is not a generated CVE report, but a realistic picture of your actual security posture.
Yes. We conduct pentests remotely and on-site across Europe. Remote tests (web app, infrastructure, AD) are location-independent. For physical assessments and social engineering we travel to your site – including outside Germany. Simply let us know your location and we will find a solution.