Network & Infrastructure Security
Network Penetration Testing.
Simulate attackers. Eliminate vulnerabilities.
Active Directory. Lateral Movement. Privilege Escalation. Firewall Bypass. We test your network infrastructure from inside and outside - before attackers do.
PTES · OSSTMM · ISO 27001
DOMAIN ADMINOrganizations that trust AWARE7 to protect their network infrastructure
- Pentests completed
- 500+
- Years of experience
- 8+
- critical findings per test
- Avg 8
- in-house testers
- 100%
Two Perspectives
External or internal network pentest?
Both tests simulate different attacker perspectives and deliver complementary findings. For a complete picture we recommend combining both.
External Pentest
Attacker from the internet
Simulates an attacker with no prior access to your infrastructure. The starting point is the public internet - exactly like a real attack.
- Exposed services: web servers, mail servers, FTP, RDP, SSH
- VPN gateways for known CVEs and misconfigurations
- DNS configuration: zone transfers, subdomain enumeration, DNSSEC
- Firewall rules and port filtering for bypass opportunities
- Mail security: SPF, DKIM, DMARC, open relay, SMTP enumeration
- Port scanning, service enumeration and vulnerability assessment
Internal Pentest
Insider or compromised endpoint
Simulates an attacker with internal network access - whether a malicious insider, a device compromised via phishing, or an attacker after initial breach.
- Active Directory: full analysis of all attack paths
- Network segmentation: VLAN hopping, broadcast attacks
- Lateral movement: pivoting through the network after initial access
- Privilege escalation: local and domain-wide elevation of privilege
- NTLM relay, Kerberoasting, Pass-the-Hash, DCSync
- Executable remotely via AWARE7 Pentest Box - no travel required
Our recommendation: Combine both tests for a complete picture. External perimeter and internal network are two sides of the same attack surface - viewed separately, blind spots emerge.
Active Directory Pentest
Active Directory: The Keys to the Kingdom
In 9 out of 10 internal pentests, the path to full domain compromise runs through Active Directory misconfigurations. We systematically check all known attack paths - from Kerberoasting to DCSync.
Kerberoasting
Service accounts with SPNs allow Kerberos tickets to be requested without admin rights. Weak passwords can be cracked offline - often within seconds.
AS-REP Roasting
Accounts without Kerberos pre-authentication yield AS-REP hashes without valid credentials. Hashcat and John the Ripper crack weak passwords offline.
Pass-the-Hash / Ticket
Stolen NTLM hashes or Kerberos tickets enable lateral movement without a plaintext password. Impacket and Mimikatz are the standard tools.
NTLM Relay
LLMNR/NBT-NS poisoning with Responder captures authentication attempts. Ntlmrelayx forwards them onward - often directly to the domain controller.
DCSync
With sufficient replication rights, all password hashes in the domain can be extracted - without local access to the domain controller.
Golden / Silver Ticket
With the KRBTGT hash, arbitrary Kerberos tickets can be forged (Golden Ticket) - unlimited, persistent domain access without knowing any password.
GPO & ACL Abuse
Misconfigured Group Policy Objects and ACL entries allow privilege escalation. BloodHound automatically visualizes all attack paths.
ADCS - Certificate Services
Active Directory Certificate Services (ESC1-ESC8): misconfigured certificate templates allow privilege escalation and persistent domain access.
BloodHound-powered attack path analysis
We use BloodHound to collect all AD objects, permissions and delegations and visualize them in a directed graph. This reveals attack paths that remain hidden in manual analysis - including chained privilege escalation across multiple hops.
Scope
Full attack surface coverage
From the external perimeter to the domain controller - we cover all attack vectors in your network infrastructure.
Network Protocols & Services
SMBv1/v2, RPC, LDAP, Kerberos, NTP, SNMP, IPMI/BMC. Legacy protocols, default credentials and insecure service configurations are identified and verified.
Network Segmentation
VLAN hopping, 802.1Q double tagging, ARP spoofing, DHCP starvation and spoofing, misconfigured trunking ports. We verify whether segments are actually isolated.
Wireless / Wi-Fi
WPA2/WPA3 weaknesses, rogue access points, evil-twin attacks, guest network isolation, client isolation, RADIUS configuration and captive portal bypasses.
VPN & Firewall
VPN gateways (IPSec, SSL/TLS, WireGuard) for known CVEs, weak cipher suites and misconfigurations. Firewall rules for excessive permissions and bypass opportunities.
IDS/IPS Evasion
Testing whether attacks are detected by deployed intrusion detection and prevention systems. Fragmentation, obfuscation and low-and-slow techniques against signature-based systems.
Lateral Movement
Simulation of network spread after initial access: pivoting through compromised systems, command-and-control paths, persistence mechanisms and data exfiltration scenarios.
AWARE7 Pentest Box
Internal pentest - without travel.
The AWARE7 Pentest Box eliminates the need for on-site visits: the hardware device is connected to your network once. Our OSCP-certified experts then conduct the full internal penetration test entirely remotely - at the same quality level as an on-site engagement.
Device connected to your network once - by post or a brief on-site visit
Encrypted mobile back-channel: no VPN, no firewall changes required on your side
After completion: return the device - no permanent remote access remains
No travel costs
No day rate for travel and accommodation - typical saving of EUR 500-1,500
Highly secure
End-to-end encryption, no permanent access, hardware-secured mobile channel
Same quality
Identical depth as an on-site engagement - the same experts, the same tools
Typical Findings
What we regularly find
Real finding types from our network pentests - anonymized, but representative of what we encounter in practice.
Domain Admin via Kerberoasting
Weak passwords on service accounts enable offline brute-force of stolen Kerberos tickets. Full Active Directory compromise demonstrated in under 4 hours - starting from a standard domain user account.
NTLM Relay to Domain Controller
LLMNR/NBT-NS poisoning with Responder captures authentication attempts. Ntlmrelayx relays the hashes directly to the domain controller - result: domain admin access without knowing a single password.
Missing Segmentation Enables Lateral Movement
Unrestricted access from the development network to production and from the guest network to internal server segments. A compromised developer machine grants full access to production infrastructure.
Legacy SMBv1 Signing Active
SMBv1 without message signing active on multiple servers - prerequisite for EternalBlue exploits (MS17-010) and NTLM relay attacks. The protocol has been considered insecure since 2017 and should be disabled.
Pricing
Transparent fixed prices
No hourly rate risk. No surprise costs. Binding fixed-price quote within 24 business hours.
External Pentest
5-10 business days
- Perimeter analysis (all public IPs)
- VPN / Firewall / DNS / Mail
- CVSS report + management summary
- Free retest included
Internal Pentest
8-15 business days
- Active Directory analysis
- Lateral movement / privilege escalation
- Pentest Box optional (no extra charge)
- Free retest included
Combined - internal & external
12-20 business days
- External + internal pentest
- Full AD assessment
- Consolidated report + roadmap
- NIS-2 / ISO 27001 compliance evidence
Custom
Scope as needed
- Large or complex network
- Multi-site / group structures
- Red team / adversary simulation
- Free initial consultation
Security Retainer - plan ahead, not react
Quarterly or semi-annual network pentests at reduced rates, a fixed slot in the project schedule, and a familiar team. Ideal for NIS-2-affected organizations and critical infrastructure operators.
Compliance
Meet regulatory requirements
Network penetration tests are explicitly required or recognized as an accepted verification measure in several regulatory frameworks.
NIS-2 Directive
Article 21 of the NIS-2 Directive requires essential and important entities to implement technical security measures, including vulnerability testing and penetration testing as recognized risk-management practices.
ISO 27001:2022
Control A.8.8 (Vulnerability Management) requires the active identification and treatment of technical vulnerabilities. Network pentests are the recognized means of demonstrating compliance.
TISAX
The ENX/VDA standard for the automotive industry (TISAX assessment level 2+) requires regular security reviews of IT infrastructure as a supplier requirement.
DORA
The EU Digital Operational Resilience Act (DORA, Articles 26-27) mandates threat-led penetration testing (TLPT) for financial entities. Our network pentests provide the technical foundation and documented evidence.
Why AWARE7 for your network pentest
Was uns von anderen Anbietern unterscheidet
Reine Awareness-Plattformen testen keine Systeme. Reine Beratungskonzerne sind zu weit weg. AWARE7 verbindet beides: Wir hacken Ihre Infrastruktur und schulen Ihre Mitarbeiter - mittelstandsgerecht, persönlich, ohne Enterprise-Overhead.
Forschung und Lehre als Fundament
Rund 20% unseres Umsatzes stammen aus Forschungsprojekten für BSI und BMBF. Unsere Studien analysieren Millionen von Websites und Zehntausende Phishing-E-Mails - publiziert auf ACM- und Springer-Konferenzen. Drei unserer Führungskräfte sind gleichzeitig Professoren an deutschen Hochschulen.
Digitale Souveränität - keine Kompromisse
Alle Daten werden ausschließlich in Deutschland gespeichert und verarbeitet - ohne US-Cloud-Anbieter. Keine Freelancer, keine Subunternehmer in der Wertschöpfung. Alle Mitarbeiter sind sozialversicherungspflichtig angestellt und einheitlich rechtlich verpflichtet. Auf Anfrage VS-NfD-konform.
Festpreis in 24h - planbare Projektzeiträume
Innerhalb von 24 Stunden erhalten Sie ein verbindliches Festpreisangebot - kein Stundensatz-Risiko, keine Nachforderungen, keine Überraschungen. Durch eingespieltes Team und standardisierte Prozesse erhalten Sie einen klaren Zeitplan mit definiertem Starttermin und Endtermin.
Ihr fester Ansprechpartner - jederzeit erreichbar
Ein persönlicher Projektleiter begleitet Sie vom Erstgespräch bis zum Re-Test. Sie buchen Termine direkt bei Ihrem Ansprechpartner - keine Ticket-Systeme, kein Callcenter, kein Wechsel zwischen wechselnden Beratern. Kontinuität schafft Vertrauen.
Für wen sind wir der richtige Partner?
Mittelstand mit 50–2.000 MA
Unternehmen, die echte Security brauchen - ohne einen DAX-Konzern-Dienstleister zu bezahlen. Festpreis, klarer Scope, ein Ansprechpartner.
IT-Verantwortliche & CISOs
Die intern überzeugend argumentieren müssen - und dafür einen Bericht mit Vorstandssprache brauchen, nicht nur technische Findings.
Regulierte Branchen
KRITIS, Gesundheitswesen, Finanzdienstleister: NIS-2, ISO 27001, DORA - wir kennen die Anforderungen und liefern Nachweise, die Auditoren akzeptieren.
Mitwirkung an Industriestandards
OWASP · 2023
OWASP Top 10 for Large Language Models
Prof. Dr. Matteo Große-Kampmann als Contributor im Core-Team des international anerkannten OWASP LLM-Sicherheitsstandards.
BSI · Allianz für Cyber-Sicherheit
Management von Cyber-Risiken
Prof. Dr. Matteo Große-Kampmann als Mitwirkender des offiziellen BSI-Handbuchs für die Unternehmensleitung (dt. Version).
Referenzen aus der Praxis
Sill Optics GmbH
Feststellung der Angriffsfläche bei Sill Optics GmbH
Pentesting & SchwachstellenscansXignSys GmbH
Whitebox-Penetrationstests eines Authentifizierungsdienstes als Mobile- und Web-Anwendung
Pentesting & SchwachstellenscansTWINSOFT GmbH & Co. KG
Externer Penetrationstest einer iOS-Applikation
How we start
Three steps to your network pentest
From first contact to a running pentest typically takes 5-10 business days.
Initial consultation
A free 30-minute call with one of our security experts. We clarify scope, objectives and open questions - no commitment, no sales pressure.
Fixed-price quote
Within 24 business hours you receive a binding fixed-price quote with a clearly defined scope, timeline and deliverables. No hourly rate, no hidden costs.
Pentest starts
After contract signing we coordinate all details with your IT team. Kick-off meeting, Rules of Engagement, emergency contacts - then the pentest begins at the agreed date.
FAQ
Frequently asked questions about network pentests
Everything you need to know before your initial consultation.
What is the difference between an external and an internal network pentest?
How long does a network penetration test take?
What is the AWARE7 Pentest Box and how does it work?
What exactly is tested during an Active Directory pentest?
Which tools does AWARE7 use during a network pentest?
Can my systems be damaged by the pentest?
How do I prepare my organization for the pentest?
What does the final report contain?
How often should a network pentest be repeated?
Is a network pentest relevant for NIS-2, critical infrastructure regulations or ISO 27001?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelFixed-price quote in 24 hours
Tell us briefly about your infrastructure - we'll prepare a binding quote for your network penetration test. No hourly rate, no hidden costs.
Kostenlos · 30 Minuten · Unverbindlich
Certifications & Standards