SVC::001-002

Penetration Testing

Full-scope attack simulation against your external and internal infrastructure. We don't run automated scans and call it a pentest — we execute manual, intelligence-driven operations that mirror real adversary behavior.

External Penetration Testing

Our external penetration tests simulate a motivated attacker targeting your organization from the internet. We begin with passive and active reconnaissance — mapping your public-facing infrastructure, identifying exposed services, enumerating subdomains, harvesting credentials from data breaches, and building a comprehensive attack profile.

From there, we move into active exploitation. Every vulnerability we identify is manually validated and exploited to demonstrate real-world impact. We don't just tell you a port is open — we show you what an attacker can do with it.

Internal Penetration Testing

Internal assessments operate under an assume-breach model. We position ourselves inside your network perimeter — either on-site or via a secure drop box — and execute the same attack playbook a compromised endpoint or malicious insider would follow.

The objective: determine how far an attacker can go once they're past your firewall. Can they escalate from a standard workstation to domain admin? Can they access sensitive databases, patient records, financial systems, or intellectual property? We map every path and prove every impact.

Ready to find out what an attacker would find in your network?

Request a Pentest

Our Methodology

Every penetration test follows a structured methodology adapted from the Penetration Testing Execution Standard (PTES) and OWASP Testing Guide. Our process ensures repeatable, thorough, and professionally documented results that satisfy compliance requirements while delivering genuine security value.

We scope every engagement with clearly defined rules of engagement, testing windows, and communication protocols. There are no surprises — just controlled, methodical, high-impact testing.

What You Receive

Every penetration test delivers a comprehensive report including an executive summary for leadership, detailed technical findings with proof-of-concept screenshots and reproduction steps, CVSS-scored risk ratings, a prioritized remediation roadmap aligned to business impact, and a live debrief session. Retesting of remediated findings is included at no additional cost.

Penetration Testing FAQ

An external penetration test includes OSINT reconnaissance, network scanning and enumeration, vulnerability identification, manual exploitation attempts, privilege escalation, lateral movement where possible, detailed findings documentation with proof-of-concept evidence, risk-rated remediation guidance, and a retest window after remediation.

Most security frameworks and compliance standards recommend annual penetration testing at minimum. However, testing should also occur after significant infrastructure changes, application deployments, mergers or acquisitions, or when new threat intelligence suggests elevated risk. Many of our clients test quarterly or semi-annually.

External testing simulates an internet-based attacker targeting your public assets — websites, email, VPNs, cloud services. Internal testing simulates a threat actor already inside your network, testing lateral movement, privilege escalation, and domain compromise from behind the firewall. Most organizations benefit from both.

We operate under strict rules of engagement defined during scoping. Destructive techniques and denial-of-service are excluded unless explicitly authorized. We coordinate testing windows and maintain constant communication. We've tested production healthcare, financial, and critical web infrastructure without incident.

Request a Penetration Test

Describe your environment and objectives. We'll respond within one business day with a tailored proposal and pricing.

Whether you need a focused external test or a comprehensive internal assessment, every engagement starts with a scoping conversation. Tell us about your network size, compliance requirements, and goals.

BASESelma, NC 27576
PC
Pendergrass ConsultingFull-service IT consulting — web dev, managed IT, cloud backup, and cybersecurity. pendergrassconsulting.com →