Infrastructure Pentest

Designed to provide high quality insights for the various organizational domains, our penetration testing covers a wide range of business or security needs. The actual testing methodology consists of commercial and proprietary tools, guided by well-known pentest standards and enriched with manual and hybrid testing methods.

Each of the avaialble penetration testing options can be applied either to one ore more web applications or web services, as well as to your company's infrastructure, internally or externally.

To enhance the value of a penetration test, SpearIT introduces the SpearIT SpearBadge™: an ad-hoc service that establishes trust by declaring your product's security readiness and your due diligence to maintain a security baseline. For more information regarding SpearBadge™ click here.


1. Scoping

During this phase, an operational environment is discussed and established with the help of written/verbal communication & scoping questionnaires, defining:

  • Legislational/compliance obligations related to pentesting activities
  • Organizational cybersecurity-needs
  • Which assets of the organization are to be tested and which are excluded
  • Allowed types of attacks
  • Testing period and timezones
  • Means of communication


2. Information Gathering

Passive OSINT (Open Source Intelligence) techniques are used in combination with neutral observation actions in order to collect as much information as possible regarding the targets to be tested. The more the information, the most attack vectors can be crafted. The intelligence gathered can be of the following types:

  • External IP blocks and relation to hosting providers
  • Company locations
  • Staff and key personnel
  • Domains and subdomains
  • Leaked credentials
  • Public IoT systems
  • Misconfigured DNS & web servers leaking information

3. Enumeration

A plethora of automated tools and manual scanning methods is utilized in order to discover possible entry points and attack vectors. The results will be used as a springboard for implementing exploitation attempts:

  • Open ports & services
  • Services misconfiguration
  • Known vulnerabilities (CVE, CVSS, etc.)


4. Exploitation

Based on the findings of the previous steps, proper attack vectors are designed and executed in order to exploit the detected vulnerabilities/flaws and penetrate into the application. The types of attacks can be:

  • Exploitation of known service vulnerabilities
  • Breached/brute-forced credentials usage
  • Information exfiltration and lateral movement
  • Escalation attacks

5. Reporting

Reports are a crucial step in a penetration testing engagement as the cornerstone deliverable which provide meaningful insights regarding the security posture of your organization, along with remediation recommendation for each detected risk. Our reports are built upon the following elements:

  • Executive summary for the management board, C-level executives
  • Intelligence report for mid-level roles
  • Detailed Technical report regarding the findings
  • Prioritized risk-based reporting
  • Traceability steps for each finding (traceID ™)
  • Security readiness badge (SpearBadge ™)
  • Remediation recommendations


6. Mitigation Verification

SpearIT can additionally offer mitigation verification services, which are executed after a penetration test report delivery and ensure the continuous and proper security readiness of your organization against known threats. The verification procedure aims to approve the proper implementation of the proposed mitigation measures and to detect any new vulnerability which may arise from the reconfiguration activities which would probably occur in the context of mitigation.

(Basic Pentest)
(Intermediate Pentest)
Level3 (Advanced Pentest)
Best Suited For
  • Periodic monitoring
  • Re-assessment purposes
  • Technical insight in security status
  • Targeted Applications
  • Targeted Systems
  • Standard penetration test
  • Initial System Security Assessment
  • Extensive insight in security status
  • Mission-critical IT projects
  • Full-range penetration test
  • Certification purposes
  • Legal Compliance
  • Audits
Reporting Type Prioritized brief technical report
  • Extensive report and management summary
  • Mitigation Recommendations
  • 3-level insight-enabled Executive, Intelligence & Technical Report
  • Mitigation Recommendations
    Port & Network Scanning
    Vulnerability Scanning
    Manual Testing
    traceID™ Reporting
    Full-range Reconnaissance
    Scope Internal/External Internal/External Internal/External
    Frequency Once-Off/Recurring Once-Off/Recurring Once-Off/Recurring

    Ready to test your infrastructure's security posture?

    Start Here!

    Latest News

    Cypriot National eID becomes pre-notified

    SpearIT is pleased to announce that the first Cypriot electronic identification (eID) scheme has now been pre-notified in the eIDAS Cooperation Network...

    Read More

    Comparisson of the Notification Activities Between the Two Data Protection Regulations for EUIs

    On 11 December 2018, Regulation (EU) 2018/1725 aka "GDPR for EUIs" came into force, replacing the older Regulation (EC) 45/2001....

    Read More

    Renewed Data Protection Regulation for EU Agencies

    On 11 December 2018, Regulation (EU) 2018/1725 aka "GDPR for EUIs" came into force, replacing the older Regulation (EC) 45/2001....

    Read More