How much does an internal network pentest cost?
The effort depends on the size and complexity of your environment. Two subnets with a few Windows clients are quickly tested - with multiple locations, server farms, OT or cloud connections, the manual effort increases significantly. We define with you how deeply to scan and how extensively to verify manually.
-
Scope & Segmentation
How many VLANs, domains and privileged systems should be covered? Each additional segment requires additional credentials, scenarios and reporting.
-
Approach & Depth
Is a validated vulnerability scan sufficient or do we also simulate quiet attacks (e.g. Kerberoasting, SMB relay, ADCS)? The more manual tuning, the higher the budget.
-
Operational Agreements
Availability windows, blue team accompaniment or additional workshops are included in the calculation - we plan transparently in advance.
We often combine automated discovery with targeted manual exploitation. Depending on compliance requirements (e.g. ISO 27001, KRITIS, NIS2), we optionally create reporting appendices or management presentations.
Segregation and Segmentation in Focus
Since attacks often start via legitimate access - phishing or stealer leaks come to mind - we test how well your network is protected internally. Segmentation, network access controls and least privilege models determine whether an attacker can escalate to domain admin or reach sensitive systems.
Sparring Partner for Your Blue Team
More mature organizations use internal pentests to test detection & response processes. We coordinate alerts, forensics and playbooks with your SOC and provide guidance for meaningful logging and alerting rules. On request, we go one step further towards red teaming.