Penetration Testing

Our highly skilled and experienced penetration testers are ready to work with you to assess the security of your systems. Having performed assessments for many Government and private industry platforms, including ones with high national visibility, our testers are well positioned to find vulnerabilities before other less well intentioned people do, and to help you to fix them. Our assessments include:

  • Web applications
  • Network and infrastructure assessments
  • Attack simulations
  • Cloud hosted environments
  • SOE assessments
  • Android and iOS mobile applications
  • Bespoke systems
  • Code reviews

Our Approach

Our testers genuinely care about making systems more secure and we want our clients to keep coming back to us to remain secure because they trust our expertise. If you are after a tick-in-the-box assessment just to say that one has been done, one of our penetration tests is probably not for you. We do not simply run an automated scan, save the output, put our logo on it and deliver a "penetration test" report! We take a comprehensive approach to assessing the security of systems and inherently understand that a one-size-fits-all approach is sub-optimal.

Pre-engagement, we conduct a meeting with our clients to obtain a full understanding of the system being tested, its intended use cases and to determine any pre-existing security concerns. We then work with the client to threat model and ensure the real threats to the system are identified and understood. This drives our penetration test to ensure that we cover the cases that are pertinent to our clients in a realistic and appropriate manner. ‍

During an assessment, our testers go as deep as required to find vulnerabilities and work with our clients to fully understand their relevance and potential impact. We understand that sometimes the ideal mitigation cannot be applied in an environment due to its configuration. Therefore, we work with our clients to find mitigations that strike the the balance between lowering the residual risk to a known and acceptable level while being practical to apply.‍

After an assessment we deliver a comprehensive report that not only details the issues identified by our testers and appropriate mitigations, we also detail vectors that the system was not vulnerable to. We believe this is key for organisations to derive maximum value from our penetration tests by enabling them to allocate the often scarce security resources to the right areas and not where systems are not vulnerable. Our testers are available for a post-engagement walkthrough of their report should this be required. ‍

Our penetration tests can also form part of a comprehensive security program for your organisation by being a key input to an IRAP assessment or to verify implementation of defensive measures and alerting. Our testers will collaborate closely with the other relevant parties to ensure seamless integration of their test cases and reports.

Our Certifications

We invest heavily in our penetration testers. They are constantly undertaking some of the best and hardest training the security industry has to offer and hold some of the most highly regarded and sought after certifications including:


Offensive Security
Certified Professional

Offensive Security
Certified Expert

Offensive Security
Web Expert

eLearnSecurity Certified
Professional Penetration Tester

eLearnSecurity Web
Application Penetration Tester