paragon-pentest ~ recon
$ nmap -sV -sC --open -p- target.example.com
Starting Nmap scan...
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 8.2
80/tcp  open  http     nginx 1.18
443/tcp open  https    nginx 1.18
8443/tcp open  https-alt
$ gobuster dir -u https://target.example.com -w wordlist.txt
/admin            (Status: 200)
/api/v1/users     (Status: 403)
$ sqlmap -u "https://target.example.com/login" --dbs
[CRITICAL] SQL injection found!
Technical Service

PENETRATION
TESTING

Real attackers don't wait for your next audit. Paragon's certified ethical hackers find your vulnerabilities before the criminals do — delivering actionable results, not just a PDF.

View Test Types
CHECK
Penetration Testing
CREST
Certified Testers
5 days
Avg Report Turnaround
500+
Engagements Completed
0
Client Breaches Post-Test
▸ WEB APP TESTINGExternal Infrastructure ▸ INTERNAL NETWORKMobile Applications ▸ RED TEAM EXERCISESSocial Engineering ▸ CLOUD SECURITY REVIEWAPI Testing ▸ OWASP TOP 10Active Directory Attacks ▸ WEB APP TESTINGExternal Infrastructure ▸ INTERNAL NETWORKMobile Applications ▸ RED TEAM EXERCISESSocial Engineering ▸ CLOUD SECURITY REVIEWAPI Testing ▸ OWASP TOP 10Active Directory Attacks
Testing Services

EVERY ATTACK SURFACE.
COVERED.

From a single web application to a full enterprise red team — we test how you'd actually be attacked, not just how a checklist says to test.

Web Application

Web App Pen Test

Manual and automated testing of your web applications against OWASP Top 10 and beyond — including business logic flaws that scanners miss.

AuthenticationAuthorisation Injection FlawsXSS/CSRF API EndpointsBusiness Logic
OWASP-mapped findings report + remediation guide
Retest included as standard
Infrastructure

External Infrastructure

Simulates a real-world attacker targeting your internet-facing assets — servers, firewalls, VPNs, exposed services, and misconfigured cloud assets.

Port & Service EnumCVE Exploitation VPN & Remote AccessDNS/Email Cloud Exposures
Prioritised risk-rated findings report
Executive summary included
Internal Network

Internal Network Test

Assumes an attacker is already inside your network — testing lateral movement, privilege escalation, Active Directory attacks, and internal segmentation.

Active DirectoryKerberoasting Lateral MovementPriv Escalation SegmentationCredential Attacks
Attack path narrative + technical findings
Assumed-breach scenario available
Mobile

Mobile Application Test

Security assessment of iOS and Android applications — covering static analysis, dynamic testing, API security, and data storage weaknesses.

iOS & AndroidOWASP Mobile Top 10 Traffic InterceptionReverse Engineering Insecure Storage
OWASP Mobile Top 10 mapped report
Source code review available
Human Layer

Social Engineering

Tests your people and processes — phishing simulations, vishing (voice), physical access attempts, and pretexting scenarios tailored to your organisation.

Spear PhishingVishing Physical AccessPretexting USB Drop
Susceptibility report + awareness recommendations
Staff awareness training add-on available
Advanced

Red Team Exercise

A full adversarial simulation with defined objectives — testing your people, processes, and technology simultaneously under realistic, covert attack conditions.

TIBER-UK / CBESTMulti-Vector C2 InfrastructureEDR Evasion Full Kill Chain
Full attack narrative + detection gap analysis
Purple team debrief included

HOW WE ATTACK

Every engagement follows a rigorous, intelligence-led methodology aligned to CHECK, CREST, and PTES standards. We don't run automated scans and call it a pentest.

Reconnaissance

OSINT, passive footprinting, and active enumeration of the target environment to build a comprehensive attack surface map before touching any system.

Passive & Active

Exploitation

Attempted exploitation of identified vulnerabilities using real attacker tools and techniques — not just theoretical flagging of CVEs that can't actually be exploited in your environment.

Manual & Tool-Assisted

Post-Exploitation

Where access is gained, we assess impact — what data can be reached, what systems can be pivoted to, what damage a real attacker could cause.

Impact Verification

Reporting

Clear, business-readable report with risk-rated findings, reproduction steps, evidence screenshots, and prioritised remediation guidance. No filler, no jargon.

Delivered within 5 days

Remediation & Retest

We support your team through fixes and then retest all findings to verify they've been correctly resolved — included in every engagement at no extra charge.

Retest Included
01
Reconnaissance

OSINT, DNS enumeration, subdomain discovery, exposed credentials

02
Weaponisation

Crafting payloads, exploit customisation, phishing lures

03
Initial Access

Phishing, exploitation of public-facing apps, valid credentials

04
Privilege Escalation

Local exploits, misconfiguration abuse, credential harvesting

05
Lateral Movement

Pass-the-hash, Kerberoasting, pivoting through network segments

06
Objective Achieved

Data exfiltration, domain compromise, impact demonstration

REPORTS THAT DRIVE ACTION

Our reports are written for two audiences: your technical team who need exact reproduction steps, and your leadership team who need to understand business risk and prioritise budget.

  • Executive Summary — Business risk narrative, overall risk rating, and key findings in plain language
  • Technical Findings — Full reproduction steps, evidence, CVSS scores, and CWE/CVE references
  • Remediation Guidance — Prioritised, actionable fix guidance for every finding
  • Retest Report — Verification of all resolved findings post-remediation

Penetration Test Report

Web Application Assessment — v1.2 FINAL

Critical
SQL Injection — Login Endpoint

Unauthenticated attacker can dump entire user database via blind SQLi in the username parameter.

Critical
Broken Access Control — IDOR

Sequential user IDs allow any authenticated user to access other users' private data.

High
Stored XSS — Profile Fields

Malicious script injected via bio field executes in all admin sessions viewing user profiles.

Medium
Missing Security Headers

CSP, HSTS, and X-Frame-Options absent — increases risk of clickjacking and content injection.

+ 11 further findings · Full report 47 pages
Compliance Drivers

TESTING THAT SATISFIES YOUR AUDITORS

Our reports are accepted by regulators, certification bodies, and enterprise procurement teams across all major frameworks.

PCI DSS

Requirement 11.3 mandates annual penetration testing for card data environments

ISO 27001

Annex A.12.6 & A.14.2 — vulnerability management and security testing controls

DORA

TLPT (Threat-Led Penetration Testing) requirements for financial entities under DORA

Cyber Essentials+

CE+ requires verified technical testing — our reports satisfy the IASME assessment criteria

GDPR / UK GDPR

Article 32 security obligations — demonstrating appropriate technical measures

SOC 2

CC7.1 — system monitoring and vulnerability scanning requirements for SOC 2 Type II

Engagement Options

TRANSPARENT FIXED-FEE TESTING

No day-rate surprises. Scope is agreed upfront and the price is fixed. All tiers include retest and final report.

Focused

TARGETED TEST

Single application, external perimeter, or defined scope

  • 1 target (web app, external IPs, or mobile app)
  • Manual + automated testing
  • OWASP / CHECK-aligned methodology
  • Risk-rated findings report
  • Remediation guidance per finding
  • 1× retest of all findings
  • Executive summary
  • Debrief call with leadership
Advanced

RED TEAM

Full adversarial simulation with defined objectives & covert ops

  • Objective-based attack simulation
  • Multi-vector (digital + physical + human)
  • Custom C2 infrastructure
  • EDR/SIEM evasion techniques
  • Full kill chain narrative report
  • Detection gap analysis
  • Purple team debrief session
  • Retesting of all attack paths

COMMON QUESTIONS

Rarely, and never without your knowledge. We agree Rules of Engagement before any testing begins — including out-of-hours windows for more disruptive tests, and explicit approval before any actions that carry even low risk of service impact. In over 500 engagements, we have never caused an unplanned outage.

A vulnerability scan is automated — it identifies known vulnerabilities but can't exploit them, chain them together, or identify business logic flaws. Penetration testing is performed by human experts who actively attempt to exploit vulnerabilities, pivot through the environment, and demonstrate real-world impact. Most compliance frameworks specifically require penetration testing, not just scanning.

Timescales depend on scope — a focused web application test typically takes 3–5 days of testing plus 2 days for reporting. A full internal/external infrastructure assessment runs 5–10 days. Red team exercises are typically 2–6 weeks. We agree the timeline at scoping stage and stick to it.

Yes. We provide all necessary scoping documentation, Rules of Engagement agreements, and authorisation letters. For AWS, Azure, and GCP environments, we follow each provider's penetration testing policies and can assist you in obtaining any required pre-approval notifications.

At minimum, annually — and after any significant changes to your environment (major releases, infrastructure changes, acquisitions). PCI DSS requires annual testing as a baseline. We recommend quarterly vulnerability assessments between annual penetration tests, and immediate testing after any significant breach or near-miss. Our retainer clients receive discounted rates for regular engagements.

FIND YOUR WEAKNESSES
BEFORE ATTACKERS DO.

Request a free scoping call — we'll confirm what needs testing, how long it takes, and what it costs. No obligation.