




Internal network penetration testing uncovers vulnerabilities in configurations and encryption, targeting unauthorized access to defend against privilege escalation, eavesdropping, and MITM attacks.
Social engineering penetration testing simulate tactics like phishing and pretexting, probing for human vulnerability to safeguard against information leaks, unauthorized access, and fraud.
External network penetration testing explores assets for flaws, focusing on threats like phishing and security perimeters to defend against data breaches, unauthorized access, and DDoS attacks.
Wireless penetration testing evaluates WiFi network security, focusing on identifying vulnerabilities in network protocols and device configurations to defend against unauthorized access, as well as cctv systems
Web app penetration testing reveals SQL injections, misconfigurations, and data exposure, targeting weaknesses to defend against credential stuffing, phishing, and session hijacking.
Red teaming simulates an attack, including strategy and tactics. Table Top Exercises simulate an organization’s response to a security incident, ensuring a thorough evaluation of your security. test your incedent response plan.

Performing a penetration test is the only way to know how effective your security measures in place are at defending against an attacker.
Cybersecurity risks are increasing with unparalleled speed, frequency, and sophistication. As organizations adopt more technology to streamline operations and achieve their goals, the risk of being a victim of a cyber attack grows exponentially.
To overcome these threats, organizations must perform continuous risk management and strive to improve their cybersecurity posture. Thirty years of history have shown that cyber risk is difficult to understand, problematic to hedge, and only likely to increase, and characterized by a continually changing threat environment.
This real-world scenario simulates actions a threat actor would take to compromise your systems for malicious purposes.
Vulnerability scanning identifies known vulnerabilities, lack of security controls, and common misconfigurations within systems on a network.
Penetration testing simulates an attack to exploit weaknesses to prove the effectiveness of your network’s security.
The main difference is that vulnerability scanning is used for both defensive and offensive cybersecurity strategies while penetration testing is offensive in nature.
Many providers will sell their services as a penetration test, but attempt to pass off a vulnerability scan as one. This is also known as a "smoke test."
With CyberWolf, you get a dedicated point of contact and a certified assessor. This approach provides a more thorough assessment of your security defenses.
The different types of penetration tests include:
There are several approaches to penetration testing, each with its own advantages and use cases. The choice between white box, black box, or gray box testing depends on your organization's specific security needs and goals.
White Box Penetration Testing
White box penetration testing, also known as clear box or transparent box testing, provides the tester with full access and complete knowledge of the target system. This includes source code, credentials, documentation, and multiple account roles.
White box testing is ideal when you want to:
Black Box Penetration Testing
Black box penetration testing simulates a real-world attack scenario where the tester has no prior knowledge of the system. The assessor is given only the target URL and mimics the behavior of an external attacker.
Black box testing is suitable when you want to:
Gray Box Penetration Testing
Gray box penetration testing falls between white box and black box approaches. The tester has partial knowledge of the system, such as basic architectural information or limited access credentials.
Gray box testing is appropriate when you want to:
In order to maximize the ROI of your penetration test, CyberWolf recommends a white box, or assumed breach, approach. This means we assume the attacker has already accessed your network or application.
The purpose of an assumed breach scenario is to test your security measures in place to prevent an attacker from moving laterally across your network or applications to steal sensitive data or deploy malware. This approach allows for a more thorough assessment of your internal security controls and provides actionable insights to improve your overall security posture.
This method aligns with the growing sophistication of cyber threats and helps ensure that your organization is prepared to defend against both external and internal attacks.
You should perform a penetration test on your network and web applications monthly .Social engineering testing should also be conducted at least quarterly.
Cyberwolf strongly recommends performing a penetration tests monthly as new vulnerabilities are discovered daily along with innovative attacks and techniques.
The frequency of performing a penetration test also depends on:
For infrastructure changes and large code deployments, it is recommended you perform a test immediately following the project.
The average cost of a penetration test is R3000 per external and R195 per Internal IP per month(min 20).
Other factors that impact the cost include the type of penetration testing being performed as well as the methodologies used. OT is more expensive as well as
On average a penetration test takes 7 days to perform. The assessment may take 3-4 days while writing the report and presenting findings may take up to 2-3 days.
Engagements can last up to 12 weeks for organizations with larger applications, 200+ endpoints, or a social engineering engagement.
Other factors that may increase the length of the engagement include:
A Penetration Testing Authorization Form is a document between your business and a cybersecurity firm, allowing them to test your systems for vulnerabilities.
The form outlines the scope of testing, specifying which systems can be tested and which are off-limits. It defines approved testing times to minimize business disruption and includes contact information for key personnel.
By signing, you give legal authorization for the cybersecurity firm to probe your systems. While controlled, these tests may cause temporary service interruptions.
This document protects both parties by defining the test scope for your business.
Every penetration testing engagement is unique and therefore needs to be scoped. For an assessor to get started they will need background knowledge of the network or application being tested.
Beyond this, you will need to provide internal resources, or resources from your outsourced vendor, to provide access to the network or application being tested.
The background information needed may include:
Network Penetration Test:
Application Penetration Test:
Every provider's report varies, however, there are 5 main elements you should look for in a penetration test report:
At CyberWolf, our reporting provides both a technical and non-technical analysis of the assessment. This allows key stakeholders the ability to follow along with the impact of the assessment while providing actionable insights for IT and development teams.
Our reporting provides an attack narrative along with detailed screenshots of the test. In addition to our remediation guidance, this level of detail enables teams to quickly identify where the issue is and remediate the vulnerability.
Remediation of network vulnerabilities is typically performed by internal IT staff or by your managed services provider. For web applications, this is typically handled by internal or third-party developers of the application.
PurpleSec does not perform remediation of any vulnerabilities.
A retest is done Monthly. When a penetration tester reassesses the discovered vulnerabilities.
1. Planning

2. Reconnaissance

3. Scanning

4. Gaining Access

5. Maintaining Access

6. Analysis & Reporting
