Penetration Test

Test the security of your enterprise systems
Contact us

The penetration test aims to identify the greatest number of vulnerabilities existing on the infrastructures and systems being analyzed. We act beneath the surface, not limiting ourselves to scanning known vulnerabilities, but verifying criticalities that cannot be detected through automatic scans. This is an Ethical Hacking activity, where a real cyber attack is simulated, testing all the systems in the defined perimeter.

Implementing a penetration test requires coordinated and transversal action: each functionality, device or endpoint that is part of the test perimeter is manually analyzed in detail in search of vulnerabilities. The experience and ability of the pen test team allow you to obtain results that are unattainable using the tools available on the market.

How Penetration Tests work


Our team of experts performs penetration testing in compliance with the OWASP standards (The Open Web Application Security Project), an open-source project that has standardized the guidelines, tools and methodologies needed to improve application security. The OWASP standards represent a point of reference in the world of information security, with effective procedures for identifying, evaluating and categorizing vulnerabilities.
Once the tests are completed, a score is given associated with the risk of cyber attacks. The risk is calculated using the CVSS (Common Vulnerability Scoring System). The risk associated with a vulnerability is calculated based on the impact it would have if it were exploited by an attacker, also taking into account the difficulty required to exploit it.

Pen Test Methodologies

There are three ways to perform this type of test:

Black Box o Zero Knowledge

As the name implies, in this methodology one has no knowledge of the target system and simulates an actual external attack. It is intended to identify what the real chances are for an attacker to breach the target in question. In this case, the developer does not share any details with our team regarding the components on the perimeter.

Quando è consigliata?

Because a lot of time is required for profiling and information gathering, this mode is recommended when there is a concrete doubt about security, but the source cannot be identified and the time window is sufficiently large.

Grey Box o Partial Knowledge

A middle ground between Black Box and White Box. In this case one has partial knowledge of the target audience and the technologies involved. One may know in more or less detail the features to be tested, the technologies involved, and the access credentials. Grey Box mode is the most common one because it gives a good result by reducing the time frame compared to a Black Box test.

White Box o Full Knowledge

Exactly the opposite of the Black Box mode, in the White Box the developer shares all the detailed documentation of the platform and functionality to be tested, along with examples of use cases, source code and other useful information to have a complete understanding of the infrastructure.

When is it recommended?

This mode is recommended for the initial, thus developmental, stages of a new application, with the aim of fine-tuning an efficient security system from the outset or following a grey/black box analysis.

You think your company's security is at risk.
Do you want to verify that all systems are secure?

Book a call with our team and request a consultation tailored to your business.

Book a call
profile image
con Pierdomenico Bodda

Co-Founder e Co-CEO

Types of Penetration Testing

Penetration tests are differentiated according to the type of system targeted by the analysis. Soter's team specializes in implementing different types of tests according to business needs.

Web application
penetration test

To test the security of a web application (site or application API).

Find out more
Network penetration test

To assess the security level of a network and the perimeter exposed to the Internet.

Find out more
Source code analysis

To find vulnerabilities within the source code of a software.

Find out more
Mobile application penetration test

To investigate the security of iOS or Android applications and, usually, their APIs.

Find out more
Wifi penetration test

To establish the security of wireless networks provided by the company.

Find out more
IoT penetration
test

To test the security and possible vulnerabilities of one or more IoT devices.

Find out more

How is a Penetration Test performed?

  1. Pre-engagement

    In this initial phase, the Soter team supports the customer in defining which service to choose and the scope of the intervention, taking into account the needs and the objective to be achieved.

  2. Proposal

    After careful evaluation, an estimate of days needed to carry out the test and write the report is proposed. The price for the activity will be provided together with the estimate of days.

  3. Acceptance and preliminary actions

    Once the proposal is accepted, the start date is set. Then further details are provided, such as the IP address of origin and all the information useful for running the test, such as any credentials and/or limitations of the test.

  4. Testing activities

    The penetration test then begins on the agreed date. If requested, the daily tests will be preceded by a formal email to start the activity and an email to end the activity. The vulnerabilities considered critical will be communicated before receiving the final report, in order to facilitate an immediate fix.

  5. Delivery of the report

    The report that will be delivered contains detailed descriptions of the vulnerabilities so that they can be easily reproduced by the technical department, accompanied by useful suggestions for solving the problems identified.

Soter: your partner for cybersecurity


Relying on professionals for your company's IT security is essential: our team boasts many years of experience in performing penetration tests. Our specialization is supported by numerous certifications recognized at company level. Talk to one of our experts, find out which solution is right for you and let's evaluate your situation together.

Request a consultation

Do you want to prevent cyber attacks in your company and guarantee a protected infrastructure for your customers? Contact us to evaluate the security of your business's IT systems.