Network & Perimeter Pentesting
External & internal attack paths; credential & lateral movement simulations.
What you get
- AD enumeration
- Phishing simulation (opt-in)
- Vuln validation
- Hardening plan
Deliverables
- Executive summary with risk & business impact
- Technical findings with CVSS scores, repro steps, evidence
- Remediation plan with prioritization
- Certificate of Testing + free re-test window