How long does a standard network penetration test take?
Basically, it depends on the size of the scope and whether both internal and external networks are to be tested. A typical network penetration test takes between 1-2 weeks, but can take longer!
We identify all relevant IT systems and services in your network and check whether they are accessible. We then search for errors, incorrect settings and security vulnerabilities. The procedure also allows you to see whether the Blue Team/the defenders would recognize the attacks.
In network penetration tests, a general distinction is made between the pentest of an internal network and the test of an external network. In the first case, the attacker is located in the internal network - which should not be accessible from the internet. In an external network pentest, the attacker comes "from outside". In other words, they try to attack the network via the Internet. In both cases, the aim is to compromise the network in some way and find security vulnerabilities. Depending on the case, the goal can also be to get from the external to the internal network. Once this has happened, there is unfortunately very little stopping the attacker in practice from stealing a lot of data or blackmailing the company by using the takeover of the internal network to encrypt it completely (ransomware).
To put it simply: in an external pentest, the penetration tester is a normal internet user with no other rights. In an internal pentest, the tester is virtually "in the company" and can access resources that are not accessible from the internet. As a rule, this means that the penetration tester is located in the company via VPN or directly.
Of course, this depends on the specific assignment. In general, the procedure corresponds to the standard process for a penetration test (briefing, execution, reporting).
Check out the in-depth article on external network penetration testing.
Check out the in-depth article on internal network penetration testing.
In both types of network penetration tests, the tester encounters various systems and cases:
Websites API CMS SSH and FTP servers Database servers Test/Dev/QA environments Shadow IT in the cloud Forgotten/outdated services Incomplete network segmentation Router Security cameras Interfaces for production facilities
"If you are in a company's internal network, you often have an easy game because internal security is unfortunately too often neglected."
Damian Strobel - Founder of DSecured
Your network is the backbone of your company. Protect it with a network penetration test from DSecured.
A large part of the internet is based on websites and web applications.
Modern websites and SPAs usually communicate with some kind of API.
Fully automated vulnerability scanning for your IT infrastructure or application.
We've had the privilege of working with some of the world's leading companies and strengthening their IT security.
Basically, it depends on the size of the scope and whether both internal and external networks are to be tested. A typical network penetration test takes between 1-2 weeks, but can take longer!
In a network penetration test, we focus on detecting vulnerabilities such as unsecured network protocols, configuration errors and vulnerabilities in the network infrastructure that could give attackers access. Detecting logins with weak passwords and unsecured network devices is also often part of (internal) network penetration tests.
Networks change every day - especially in larger companies. In this respect, frequent network testing is important. Once a year would be the absolute minimum.
That shouldn't be a problem - it's just important to record what exactly is to be shared in advance. Normally, these pentests generate a relatively large amount of data, which then needs to be analyzed.
Network penetration tests - whether internal or external - are usually carried out in the production environment. It therefore makes sense to consider the times at which testing should take place. A presentation of the network structure and access data (if necessary) for the testers is also important.
Our pentest report will be sent to you after the test has been completed. This includes a summary for management as well as technical details for your IT department. In addition, we offer a debriefing session to explain the report and discuss next steps.
Have questions about our services? We'd be happy to advise you and create a customized offer.
We'll get back to you within 24 hours
Your data will be treated confidentially
Direct contact with our experts