Skip to content
Offensive Security — Flagship Service

Network Penetration Testing

OSCP-led external and internal network penetration testing — including Active Directory attacks, lateral movement, and real exploitation. Not a vulnerability scan. Not a checkbox report.

AED 20,000 – 60,000 OSCP · CPTS · CEH 2 – 3 weeks typical
Book a 30-min Scoping Call →
Book a 30-min Scoping Call →
Jump to FAQ

What it is

A network penetration test is a real-world attack simulation against your external-facing infrastructure, internal network, and Active Directory domain — performed manually by certified offensive security practitioners.

We do not run a vulnerability scanner and hand you the output. We start where the scanner stops: chaining findings together, escalating privileges, moving laterally, and demonstrating the actual business impact of the weaknesses we find. Where exploitation is feasible, authorised, and safe, we exploit — because the only way to know whether an issue matters is to see what an attacker can do with it.

Every engagement ends with a prioritised remediation plan, a live walkthrough session with your team, and one free re-test of the critical findings after you've remediated.

What this is not

Not a vulnerability scan. Scans find patterns; pen tests find paths.
Not a compliance checkbox. Useful for audit evidence, but compliance is a side effect — not the purpose.
Not limited to "safe" findings. We test realistic attack scenarios within the rules of engagement you set.
Not delivered by juniors. Every engagement is led by an OSCP or CPTS holder.

Who this is for

You're probably here because one of these is true:

1
You're preparing for an ISO 27001, SOC 2, or NESA audit and need third-party pen-test evidence.
2
An enterprise client or bank has asked for a pen-test report as a condition of onboarding.
3
You migrated infrastructure (new cloud, M&A, data-centre move) and need validation before going live.
4
Your board or CISO has asked what your actual attack surface looks like — and "the last vuln scan" isn't the answer.
5
You had an incident or near-miss and need external validation that the gap is closed.

What you get

  • Scoping document (1 – 2 pages) — rules of engagement, IP scope, credentials, timeline, escalation contacts, blackout windows.
  • Findings report (typically 30 – 60 pages) — every finding with CVSS score, reproduction steps, screenshots, business impact, and specific remediation guidance.
  • Executive summary (1 – 2 pages) — CISO / board / audit-committee consumable. Plain English. No jargon.
  • Live remediation walkthrough (90 minutes) — your technical team + our lead tester go through every critical and high finding on screen.
  • Free re-test of remediated critical and high findings within 30 days — we validate that the fixes actually work and issue a re-test report.
  • Clean-up evidence — every artefact we placed on your systems during testing is removed and documented.

Reports are delivered as signed PDFs — and as an editable .docx if your auditor needs it.

How we deliver

01
Scoping
2 – 3 days
60-minute call, asset inventory, rules of engagement, credentials provisioning, legal authorisation signed.
02
External reconnaissance
2 – 3 days
OSINT, attack surface mapping, service enumeration, initial external exploitation.
03
Internal + Active Directory testing
5 – 10 days
Internal network enumeration, credential access, lateral movement, privilege escalation, domain-admin path validation.
04
Reporting
3 – 5 days
Findings compilation, CVSS scoring, executive summary, internal review pass.
05
Walkthrough session
90 minutes
Live screen-share through every critical and high finding with your technical team.
06
Re-test
Within 30 days of remediation
Validate fixes on all criticals and highs; issue re-test report.

Typical total: 2 – 3 weeks from signed scoping to delivered report. Expedited delivery (1.5 weeks) available on request with a 20% expedite fee.

Pricing

Published range

AED 20k – 60k

Per engagement. Scoping call + written quote within 48 hours.

What drives the price:

  • Number of live hosts in scope
  • External-only vs. internal-only vs. combined
  • Active Directory domain size & trusts
  • Timeline (standard vs. expedited 1.5-week)
  • Re-test iterations beyond the included first re-test

Commercial terms

  • Deposit: 50% at signing; balance on final report
  • Net terms: Net-30 from invoice date
  • Quote validity: 30 days
  • Re-test: 1 × critical/high re-test included
  • Scope changes: require written change request
  • No surprise charges. Ever.

Your cert-backed team

Every engagement is led by a named practitioner with documented offensive security credentials — never handed to an anonymous junior.

Lead Penetration Tester

Nelson Durairaj

OSCP · eJPT · CEH · BlackHat Linux · HTB Omniscient

Focus: External + internal network testing, Active Directory exploitation, lateral movement, privilege escalation.

Supervising Practitioner

Manoj Prabhakaran

CPTS · CDSA · Security+ · Azure Cloud Security · ISO 27001 Lead Auditor · HTB Omniscient

Focus: Engagement oversight, report quality review, complex engagements, audit-evidence alignment.

See the full team →

Frequently asked questions

How is this different from a vulnerability scan?

A vulnerability scan produces a list of potential issues — often thousands, many false-positive. A penetration test validates which issues are actually exploitable, chains them together, and demonstrates real business impact. We use scanners as part of the toolkit because they're fast at coverage — but the testing is manual and the report is human-written.

Do you use automated tools?

Yes — Nmap, Nessus, Nuclei, BloodHound, Responder, Impacket, Metasploit, and others, alongside custom tooling. Tools don't write the report or decide what to exploit next — our testers do.

What's the typical timeline from signed scope to final report?

2 – 3 weeks is the standard cadence for a mid-market engagement (20 – 100 hosts, single AD forest). Larger environments or combined external + internal + cloud scopes can extend to 4 – 5 weeks. Expedited delivery in 1.5 weeks is available with a 20% expedite fee.

What happens if you find a critical vulnerability during testing?

We contact your nominated escalation point — immediately if the issue is actively exploitable from the internet, otherwise within business hours. You can choose to pause testing, keep testing, or remediate in parallel. Your call.

Can you test production systems?

Yes. We define safe testing windows, exclude known-fragile systems from active exploitation, and use rate-limiting and careful exploitation on production. Most mid-market clients test production — it's where the real risk lives.

What do you need from us to get started?

A signed Rules of Engagement and Authorisation Letter, an in-scope IP list, escalation contacts, blackout windows, and — for internal testing — VPN access or a staged test device on your internal network.

Is the first re-test always included?

Yes. One re-test of remediated critical and high findings within 30 days of the final report is included in the base fee. Additional re-tests are charged separately.

Are your reports suitable as ISO 27001 or SOC 2 audit evidence?

Yes. Our reports include scope definition, methodology, testing dates, named testers and their credentials, CVSS-scored findings, remediation status, and re-test validation — all the elements auditors look for.

Ready to see what an attacker would actually find?

Book a 30-minute scoping call. We'll scope your engagement, give you a price range in writing within 48 hours, and answer any question you have about the methodology, timeline, or deliverables.

Book a Scoping Call →
Book a Scoping Call →