Our test types
- Application Penetration Test
Testing of web and mobile applications based on international standards (e.g. OWASP Top 10). The goal is to detect data leaks, weaknesses in authentication and authorization, and insecure interfaces. - Infrastructure Penetration Test
Analysis of internal and external IT systems, network components and services. We show whether an attacker could move laterally in the network – up to full compromise. - Red Teaming
Realistic attack simulation over several weeks. We combine technical attacks, social engineering and bypassing processes to test your company’s detection and response capabilities. - Social Engineering Tests
We check how well your employees are prepared for attack attempts such as phishing or spear phishing – and provide targeted recommendations for awareness measures.
Methods: Whitebox, Greybox and Blackbox
- Whitebox Testing
We receive comprehensive information from you (e.g. source code, network diagrams, credentials) and can therefore test particularly deeply and efficiently. Ideal for targeted quality assurance and compliance requirements. - Greybox Testing
We start with a medium level of information – similar to an internal attacker or a partner with restricted access. This allows us to simulate realistic attack paths and uncover weaknesses that could be exploited from both outside and inside. - Blackbox Testing
We act like an external attacker without prior knowledge. This shows you how easy (or difficult) a real attack from the outside would be. The focus is on realistic attack scenarios against publicly accessible systems.

