IT penetration tests - simulate attacks, increase security

We realistically test your IT systems for vulnerabilities before attackers do. With our configurator, you can put together the right pentest transparently.

csm_IT_Security_made_in_Germany_TeleTrusT_Seal

Why an IT pentest is indispensable

Today, corporate IT is exposed to a wide range of risks: from outdated or incorrectly configured systems in the internal network to externally accessible servers and services. The threat situation is constantly growing and attacks are becoming more targeted and professional. At the same time, standards and specifications such as ISO 27001 or NIS2 require proof of effective security measures. An IT pentest helps to meet these requirements and uncover specific vulnerabilities in good time.

Realistic simulation of attackers

Transparent presentation of risks

Clear recommendations for action

IT pentest at a glance

What we test for you - from networks to applications, to uncover security gaps before others do.

ics_gmbh_pentest_it-infrastructure

IT infrastructure

In an infrastructure pentest, we check your internal systems such as servers, routers, switches or access points. We simulate an attacker in the company network with little prior knowledge and identify vulnerabilities such as outdated software, misconfigurations or insecure access.

Scope:

  • Checking the network level from an internal perspective
  • Identification of open ports and services
  • Vulnerability scans and manual checks
  • Assessment of patch status, configuration and access controls
ics_gmbh_pentest_applications_interfaces

Applications & interfaces (Web App / API)

We test your applications or APIs for typical vulnerabilities in logic, authorizations and interfaces. The test is based on OWASP Top 10 and common standards.

Scope:

  • Input validation, error handling, sessions
  • Authentication and rights management
  • Business logic tests (e.g. roles, workflows, payment flows)
  • API endpoints: Input/output, interface logic, documentation
  • Combination of vulnerabilities into realistic attack scenarios
THE ICS CONFIGURATOR

Configureyour IT pentest

Select the scope, systems and add-ons - you will immediately receive a transparent result. For more than 50 systems or special cases, we’ll provide a customized quote.

 

Procedure & quality

This is how your pentest with ICS works.

All tests are carried out in accordance with recognized standards such as OWASP, PTES and OSSTMM. We proceed in a structured and careful manner so as not to compromise your systems and at the same time obtain a realistic picture of your security situation.

ics_1966_think_safe_think-ics

1. Scoping & Target Definition

2. Implementation & Tests

3. Evaluation & Catalog of Measures

4. Final Meeting & Follow-up

Report & conclusion

Clear results, comprehensible measures

Each pentest contains a report with all findings, risk assessment and prioritization. We offer an optional web review or on-site workshop.

Ready to test your systems?

Put together the right pentest now or talk to us directly about your project.

FAQ - Frequently asked questions

How are the systems to be tested counted?

We count unique, addressable systems such as servers, routers, switches or routers. We clarify replicated systems individually, often counting them as a single system.

How does the price scale for IT infrastructure work in the configurator?

Prices increase in stages depending on the number of systems (in increments of 10 - e.g. 1-10, 11-20 etc.) From 50 systems upwards, we will be happy to provide you with a customized quote.

What does the Active Directory Security Test involve?

The AD test analyzes your AD environment for misconfigurations and identifies attack paths through to domain admin rights - a separate, in-depth check.

Can I request the Insider Threat Test separately?

Yes, the simulation of an "insider attack" can be booked as a stand-alone test or combined with an infrastructure pentest - you receive a price advantage for the combination.

Which add-ons can be usefully combined?

Depending on your requirements, you can add workstation or IDS tests, wireless security or OSINT, for example, to match the selected areas.

Will the IT pentest affect my productive operations?

We plan our tests in a coordinated manner. Many steps can be carried out in a test environment or outside the production flow. Also possible: low-risk approaches in sensitive environments.

What happens if my infrastructure is larger than 50 systems?

For large or complex environments, we create a customized offer. Contact us directly to coordinate the scope, costs and process in the best possible way.

Book a consultation now!

Put together the right pentest now or talk to us directly about your project in a non-binding & free initial consultation.