<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Jason </title>
    <description>The latest articles on DEV Community by Jason  (@artificesec).</description>
    <link>https://dev.to/artificesec</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3227621%2F29150a92-358c-483a-9a4d-1c3d62b4374d.jpg</url>
      <title>DEV Community: Jason </title>
      <link>https://dev.to/artificesec</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/artificesec"/>
    <language>en</language>
    <item>
      <title>What Is a Red Team Assessment?</title>
      <dc:creator>Jason </dc:creator>
      <pubDate>Fri, 06 Jun 2025 06:48:51 +0000</pubDate>
      <link>https://dev.to/artificesec/what-is-a-red-team-assessment-2ch2</link>
      <guid>https://dev.to/artificesec/what-is-a-red-team-assessment-2ch2</guid>
      <description>&lt;p&gt;&lt;strong&gt;TL;DR&lt;/strong&gt;&lt;br&gt;
A red team assessment is a real-world attack simulation that tests how well your people, processes, and systems can detect and respond to a threat. Unlike a penetration test, which looks for as many vulnerabilities as possible, red teaming is goal-driven. It mimics adversary behavior to evaluate whether your defenses actually work under pressure. This is about detection and response, not just patching CVEs.&lt;/p&gt;




&lt;h2&gt;
  
  
  What is a Red Team Assessment?
&lt;/h2&gt;

&lt;p&gt;A red team assessment is a full-scope security exercise that simulates how a real attacker would target your organization. Unlike &lt;a href="https://artificesecurity.com/services/" rel="noopener noreferrer"&gt;penetration testing&lt;/a&gt;, which focuses on finding and documenting vulnerabilities, red teaming is about stealth, persistence, and impact. The objective is to test not just your systems, but your security team’s ability to detect and respond to threats in real time.&lt;/p&gt;

&lt;p&gt;At its core, red teaming is an adversary simulation which means your organization plays defense while a skilled external team plays offense. The red team will often begin with reconnaissance, gain initial access, escalate privileges, and move laterally through systems in an attempt to achieve a goal like exfiltrating data, compromising credentials, or reaching sensitive environments, all while trying to stay undetected.&lt;/p&gt;

&lt;p&gt;This type of engagement answers a critical question: &lt;strong&gt;Can your organization detect and contain a real attack before damage is done?&lt;/strong&gt;&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;Cybersecurity stats show that the US will be a lucrative target for more than 50 percent of cybercrime attacks by 2027 (Cybersecurity predictions reveal that the US going to be a soft target for more than half of cybercrime attacks in another five years, hence US-based companies should consider reinforcing their protection against cyber threats.)&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  How is a Red Team Assessment Different from a Penetration Test?
&lt;/h2&gt;

&lt;p&gt;It’s common to confuse what a red team vs penetration test is, but they serve very different purposes. A penetration test (or pentest) focuses on identifying as many vulnerabilities as possible within a defined scope. The goal is to find flaws, confirm they’re exploitable, and provide remediation guidance. Pentesters often work with knowledge of the environment, operate in a cooperative manner, and may have access to credentials or internal systems to speed up discovery.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://artificesecurity.com/services/red-team-assessment/" rel="noopener noreferrer"&gt;A red team assessment&lt;/a&gt;, in contrast, simulates a real-world attack without alerting the defenders. The red team plays the role of an adversary. They’re not trying to find every vulnerability. Their mission is to achieve a specific objective, such as accessing sensitive data, compromising a privileged account, or reaching a protected network segment. The focus is on testing detection and response, not just technical exposures.&lt;/p&gt;

&lt;p&gt;Another key distinction is in how each test is conducted. Penetration tests are often scheduled and coordinated in advance. Red team operations are stealthy. They mimic actual threat actor behavior, including persistence and evasion. This is why red teaming is often called adversary simulation. It’s not about what’s broken, but what can be exploited quietly and effectively.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fanuxf2km398c1oxbcizm.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fanuxf2km398c1oxbcizm.jpg" alt="Table comparing vulnerability scanning, penetration testing, and red team assessments across purpose, frequency, methods, and value" width="800" height="846"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;If you’re comparing a red team vs penetration test, it comes down to this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Pentest:&lt;/strong&gt; What’s vulnerable?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Red team:&lt;/strong&gt; Can your team detect and contain a real attacker?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Both are valuable. They simply answer different security questions.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Are the Goals of a Red Team Operation?
&lt;/h2&gt;

&lt;p&gt;The main goal of a red team assessment is not to find every vulnerability. It is to simulate how a real attacker would approach your organization. This involves gaining access, avoiding detection, and using realistic tactics to test how well your people, processes, and technology respond to a live threat.&lt;/p&gt;

&lt;p&gt;A red team operation is objective-based. Instead of following a checklist, the red team is given specific missions to accomplish, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Accessing sensitive financial systems&lt;/li&gt;
&lt;li&gt;Gaining domain administrator privileges&lt;/li&gt;
&lt;li&gt;Exfiltrating customer or patient data&lt;/li&gt;
&lt;li&gt;Reaching production environments without being noticed&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These objectives mirror how real adversaries operate. They rely on planning, persistence, and creative thinking to achieve specific outcomes.&lt;/p&gt;

&lt;p&gt;Another major goal is to test your organization’s detection and response capabilities. Can your security team identify abnormal behavior? Are logs being collected and monitored? If something suspicious is discovered, how quickly and effectively can the team contain it?&lt;/p&gt;

&lt;p&gt;Red team assessments often reveal gaps across departments, not just in your technical defenses. Successful engagements might involve phishing employees, bypassing physical security controls, or escalating privileges from a basic user account into critical infrastructure, all while remaining undetected.&lt;/p&gt;

&lt;p&gt;In summary, a red team assessment shows you how far a determined adversary could go if they targeted your organization. It provides a reality check and a roadmap for improving your overall defensive posture.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Happens During a Red Team Assessment? (Phases)
&lt;/h2&gt;

&lt;p&gt;A red team assessment follows a structured series of phases that mirror how real attackers operate. Each step is designed to test not just technical defenses, but also detection, response, and decision-making under pressure. While tactics vary based on the target and goals, most red team operations follow a framework similar to this:&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F380xnp3yl4wdkhetwixq.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F380xnp3yl4wdkhetwixq.jpg" alt="Aerial view of a power company administrative facility used in a red team simulation" width="800" height="453"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  1. Planning and Scoping
&lt;/h3&gt;

&lt;p&gt;Every red team operation starts with clearly defined objectives. The planning phase includes identifying target systems, outlining rules of engagement, defining success criteria, and making sure all stakeholders understand the scope. This is also where safety controls and legal protections are put in place.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Reconnaissance
&lt;/h3&gt;

&lt;p&gt;The red team gathers intelligence about your organization using both passive and active methods. This may include scanning public records, scraping employee data from LinkedIn, mapping external infrastructure, identifying third-party services, or reviewing DNS, WHOIS, and OSINT data sources.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Initial Access
&lt;/h3&gt;

&lt;p&gt;Next, the team attempts to gain a foothold. This might happen through phishing, exploiting misconfigurations, abusing weak credentials, or bypassing exposed services. The goal is to enter the environment without alerting defenders.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Privilege Escalation and Lateral Movement
&lt;/h3&gt;

&lt;p&gt;Once inside, the red team works to increase its access and move deeper into the environment. They might exploit local vulnerabilities, harvest credentials, crack password hashes, or pivot through systems to get closer to high-value targets.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Objective Execution
&lt;/h3&gt;

&lt;p&gt;This is where the red team attempts to complete its primary goal. That could involve extracting data, accessing sensitive applications, simulating ransomware deployment, or compromising domain controllers. Everything is documented, but the objective is completed in a controlled, non-destructive manner.&lt;/p&gt;

&lt;h3&gt;
  
  
  6. Reporting and Debrief
&lt;/h3&gt;

&lt;p&gt;After the operation, the red team delivers a detailed report that includes the attack path, all techniques used, detection points (if any), and actionable recommendations. This is often followed by a debrief with the blue team to review what happened, where gaps exist, and how to improve detection and response moving forward.&lt;/p&gt;




&lt;h2&gt;
  
  
  Who Needs a Red Team Assessment?
&lt;/h2&gt;

&lt;p&gt;Red team assessments are not for every organization. They are best suited for businesses that already have basic security measures in place and want to test how well those defenses hold up under a real attack scenario.&lt;/p&gt;

&lt;h3&gt;
  
  
  Ideal candidates for red teaming include:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Mid-sized to large enterprises&lt;/strong&gt; with mature IT and security operations&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Organizations with an internal blue team or SOC&lt;/em&gt;* that want to validate their detection and response capabilities&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Critical infrastructure sectors&lt;/strong&gt; such as energy, healthcare, or finance, where impact from a breach could be catastrophic&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Compliance-driven businesses&lt;/strong&gt; that must go beyond checkboxes and demonstrate true resilience&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SaaS or technology companies&lt;/strong&gt; handling sensitive data across customer-facing apps and APIs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If your team is only beginning to address basic vulnerabilities, a &lt;a href="https://artificesecurity.com/services/" rel="noopener noreferrer"&gt;penetration test&lt;/a&gt; or &lt;a href="https://artificesecurity.com/services/vulnerability-scanning-services/" rel="noopener noreferrer"&gt;vulnerability scan&lt;/a&gt; is a better starting point. But if you want to know how your systems, staff, and procedures perform when faced with a stealthy, persistent adversary, a red team assessment will give you the answers you are looking for.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ferp5j0uyjx1mipv9cuzp.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ferp5j0uyjx1mipv9cuzp.jpg" alt="Cooling tower perimeter showing low fence spot identified during physical recon" width="800" height="476"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;This type of assessment is particularly useful before a major audit, after a security architecture overhaul, or as part of a regular resilience testing program. It provides not only technical insights, but also clarity on whether your incident response playbooks are effective in practice.&lt;/p&gt;




&lt;h2&gt;
  
  
  How to Prepare for a Red Team Assessment
&lt;/h2&gt;

&lt;p&gt;Red team assessments are only as effective as the preparation that goes into them. If your organization is not ready, the results may not reflect your actual defensive capability, or worse, the engagement may cause confusion or disruption. Taking time to prepare ensures that you get real value from the test.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;1. Define Clear Objectives&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;What do you want to learn from this assessment? Are you testing your blue team’s response, identifying detection gaps, or evaluating response procedures? Clarity around goals will shape how the red team plans and executes the operation.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;2. Set Rules of Engagement (ROE)&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Work with the red team to define what is in and out of scope. This includes specifying which systems can be targeted, what types of attacks are allowed, who should be notified in case of escalation, and what the success criteria will be.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;3. Confirm Monitoring and Logging&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Make sure your defensive systems are in place and functioning. Your blue team should have access to logging, SIEM tools, endpoint detection, and network visibility. If detection is part of the objective, it is critical that telemetry is available to measure performance.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;4. Align Internally Without Breaking Stealth&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Only a limited number of stakeholders should know the test is happening. However, those individuals need to be aligned on the scope, timeline, safety controls, and how to respond if something unexpected occurs.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;5. Review and Test Response Playbooks&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Have your incident response procedures and escalation paths documented and accessible. This is your chance to see how those processes hold up under pressure. If the red team simulates exfiltration or domain takeover, how will your team respond?&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;6. Prepare for the Post-Engagement Phase&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Plan to review the findings as a team. This is where most of the value comes from. A strong red team report will include attack paths, missed detection opportunities, and tactical recommendations. Be ready to use that feedback to close gaps and strengthen your overall posture.&lt;/p&gt;

&lt;p&gt;The above list will help you prepare for red teaming. Preparing well helps ensure the red team engagement is focused, safe, and valuable. It also gives your internal teams the chance to learn, improve, and grow, which is the whole point of testing in the first place.&lt;/p&gt;




&lt;h2&gt;
  
  
  Real-World Example from a Red Team Engagement
&lt;/h2&gt;

&lt;p&gt;In one red team assessment, we were hired by a regional power company to test both their digital and physical security. The goal was simple: simulate how an attacker could breach their facility and gain access to systems controlling power distribution.&lt;/p&gt;

&lt;p&gt;We started by performing reconnaissance from public sources. Within a few hours, we identified vendor badge templates, LinkedIn profiles of contractors, and photos of employees entering the building. Using this information, we created a forged contractor badge and mimicked the uniform style worn by their HVAC vendor.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5d05nvurhenr1omd19zk.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5d05nvurhenr1omd19zk.jpg" alt="Bypass tool inserted into a door latch during a physical red team assessment" width="800" height="829"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;On the day of the test, we arrived on site, blended in with the morning shift, and tailgated a group of employees through the rear entrance of the building. Other red teamers found a low spot in a fence and made their way in the facility. Once inside, we plugged a drop box into an open Ethernet port in a rarely used conference room. The device was configured to call back over a cellular connection, giving us remote access to the internal network.&lt;/p&gt;

&lt;p&gt;Within two hours, we had domain-level credentials, access to operational control systems, and visibility into the SCADA network. The company’s security team was unaware of the intrusion until we presented our findings a few days later.&lt;/p&gt;

&lt;p&gt;This assessment proved how physical access combined with light social engineering could lead to complete compromise of critical infrastructure. It was a wake-up call for leadership, and it led to significant improvements in both badge policy and network segmentation.&lt;/p&gt;




&lt;h2&gt;
  
  
  Final Thoughts: Where Red Teaming Fits in a Security Program
&lt;/h2&gt;

&lt;p&gt;Red team assessments are not where security begins. They are what you invest in once the basics are already in place. Organizations that benefit the most from red teaming are the ones that want to validate their detection, response, and recovery in real-world scenarios.&lt;/p&gt;

&lt;p&gt;Think of red teaming as the ultimate stress test for your people, your technology, and your process. If your organization already runs regular &lt;a href="https://artificesecurity.com/services/vulnerability-scanning-services/" rel="noopener noreferrer"&gt;vulnerability scans&lt;/a&gt;, conducts annual &lt;a href="https://artificesecurity.com/services/" rel="noopener noreferrer"&gt;penetration testing&lt;/a&gt;, and has an incident response plan on paper, a red team assessment helps answer the next question: how well does it all work when an actual threat is simulated?&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2j10sytzxkjysg8cpz3d.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2j10sytzxkjysg8cpz3d.jpg" alt="Pyramid graphic illustrating security testing hierarchy: Vulnerability Scanning, Penetration Testing, Red Team Assessment" width="800" height="590"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Red team operations are most effective when done as part of a broader security program. They should complement your ongoing defensive efforts, not replace them. These assessments can be used to identify weaknesses in your SOC’s visibility, expose blind spots in your architecture, and improve the quality of your response procedures.&lt;/p&gt;

&lt;p&gt;For organizations subject to regulatory frameworks or those operating in critical industries, red teaming is not just valuable, it is becoming expected. As threats become more targeted and persistent, your defenses need to be tested against realistic adversaries, not just automated scans.&lt;/p&gt;

&lt;p&gt;If your team wants to go beyond checkboxes and see how it performs under real pressure, a red team assessment will give you answers that no dashboard can.&lt;/p&gt;




&lt;h2&gt;
  
  
  Want to See How Your Security Team Handles a Real Attack?
&lt;/h2&gt;

&lt;p&gt;At Artifice Security, we conduct red team assessments that simulate stealthy adversaries across physical, digital, and hybrid environments.&lt;br&gt;
We show you how an attacker could gain access, what would go undetected, and what it would take to stop them, before it happens in real life.&lt;/p&gt;

&lt;p&gt;✅ Real adversary simulation&lt;br&gt;
✅ Full kill chain, from recon to exfil&lt;br&gt;
✅ Actionable reporting that cuts through the noise&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://artifice-security.youcanbook.me/" rel="noopener noreferrer"&gt;Schedule a consultation&lt;/a&gt;&lt;br&gt;
👉 Or &lt;a href="https://artificesecurity.com/contact/" rel="noopener noreferrer"&gt;contact us here&lt;/a&gt; with questions&lt;/p&gt;




&lt;h2&gt;
  
  
  FAQ
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What is the purpose of a red team assessment?&lt;/strong&gt;&lt;br&gt;
The purpose of a red team assessment is to simulate a realistic, stealthy cyberattack to evaluate how well your organization can detect, respond to, and contain a threat. It is less about finding every vulnerability and more about exposing blind spots in detection and response.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How long does a red team assessment usually take?&lt;/strong&gt;&lt;br&gt;
Most red team engagements take between two and four weeks, depending on the size of the organization, the scope, and the complexity of the environment. Some advanced operations may run longer to simulate persistent threats more accurately.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How is red teaming different from penetration testing?&lt;/strong&gt;&lt;br&gt;
Penetration testing focuses on identifying technical vulnerabilities in a defined scope. Red teaming focuses on simulating an adversary’s behavior, using stealth and creativity to achieve specific goals like data exfiltration or privilege escalation. It is about testing your ability to respond, not just your exposure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How often should a company do red team assessments?&lt;/strong&gt;&lt;br&gt;
For mature organizations, once a year is a strong baseline. Some companies integrate red teaming into a larger purple team program, alternating red team assessments with blue team training and response tuning throughout the year.&lt;/p&gt;




&lt;h3&gt;
  
  
  About the Author
&lt;/h3&gt;

&lt;p&gt;Jason Zaffuto is the founder and lead consultant at Artifice Security, where he specializes in manual penetration testing, red team operations, and adversary simulation. With more than 25+ years of experience in offensive security, military intelligence, and critical infrastructure assessments, Jason brings real-world insight to every engagement.&lt;/p&gt;

&lt;p&gt;Before launching Artifice Security, he led red team projects at Rapid7, performed physical and network security testing for NASA and DHS, and conducted global operations as part of U.S. military intelligence teams. He holds certifications including OSWE, OSCP, OSCE, and CPSA.&lt;/p&gt;

&lt;p&gt;Jason’s mission is simple: test systems like real attackers would, and give clients the clarity they need to improve.&lt;/p&gt;

&lt;p&gt;📍 Learn more at &lt;a href="https://artificesecurity.com/" rel="noopener noreferrer"&gt;ArtificeSecurity.com&lt;/a&gt; or &lt;a href="https://artifice-security.youcanbook.me/" rel="noopener noreferrer"&gt;schedule a consultation&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>discuss</category>
      <category>security</category>
      <category>learning</category>
    </item>
    <item>
      <title>What Is Web Application Penetration Testing? Manual Pentesting Explained</title>
      <dc:creator>Jason </dc:creator>
      <pubDate>Thu, 05 Jun 2025 08:08:42 +0000</pubDate>
      <link>https://dev.to/artificesec/what-is-web-application-penetration-testing-manual-pentesting-explained-497d</link>
      <guid>https://dev.to/artificesec/what-is-web-application-penetration-testing-manual-pentesting-explained-497d</guid>
      <description>&lt;p&gt;&lt;strong&gt;TL;DR:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Web application penetration testing is a manual, real-world simulation of how attackers would try to break into your web app. It goes far beyond automated scans by uncovering logic flaws, chaining vulnerabilities, and testing how your defenses actually hold up. Done right, it protects sensitive data, prevents breaches, satisfies compliance requirements, and gives you peace of mind that scanners alone can’t provide.&lt;/p&gt;




&lt;h2&gt;
  
  
  What is Web Application Penetration Testing?
&lt;/h2&gt;

&lt;p&gt;Web application penetration testing is the process of ethically hacking a web app to identify and fix security weaknesses before an attacker can exploit them. Unlike automated vulnerability scanners, which only scratch the surface, a proper web app pen test mimics real-world attack scenarios. It involves manual testing techniques designed to expose flaws in logic, authentication, access controls, session handling, and more which are the kinds of issues that automated tools often miss.&lt;/p&gt;

&lt;p&gt;At Artifice Security, we specialize in manual penetration testing on web applications because we know what real attacks look like. Our job isn’t to generate a long report of false positives, it’s to help you understand how a skilled attacker would target your application, what they could do if they succeed, and how to stop them.&lt;/p&gt;




&lt;h2&gt;
  
  
  What’s the Difference Between a Vulnerability Scan and a Pentest?
&lt;/h2&gt;

&lt;p&gt;A vulnerability scan is an automated process that checks your web application for known issues, usually by comparing it against a database of signatures. It’s fast, relatively inexpensive, and helpful as a first step in your security program. But a scan is not a web application penetration test.&lt;/p&gt;

&lt;p&gt;Web application penetration testing goes far deeper. A proper pen test on a web application involves manual analysis and exploitation techniques used by real attackers. Instead of just listing unpatched software or missing headers, a web app pen testing engagement simulates how an attacker would exploit authentication flaws, bypass business logic, escalate privileges, and pivot through a sequence of vulnerabilities to access sensitive data.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhiqlzjjvmgkmw3lc2u75.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhiqlzjjvmgkmw3lc2u75.jpg" alt="Cybersecurity-style illustration showing a hooded figure analyzing a laptop, with highlighted labels SQLi, XSS, and Broken Auth on a glowing screen, set against a dark blue background with binary code and bug icons" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Scanners cannot think. They do not follow conditional flows, misuse inputs creatively, or combine multiple smaller issues into a real-world breach. Human testers can. That is the core difference. A scanner might alert you to an outdated JavaScript library. A manual web application penetration test might show that an attacker could use that library to hijack sessions and steal user accounts.&lt;/p&gt;

&lt;p&gt;If you are only running vulnerability scans, you are seeing the surface. Manual penetration testing on web applications reveals the depth that real attackers are counting on you to miss.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Is Web App Pen Testing Important?
&lt;/h2&gt;

&lt;p&gt;Web applications are one of the most common entry points for attackers. They’re exposed to the internet, handle sensitive data, and often include complex functionality like authentication, file uploads, and integrations with other systems. If there’s a flaw, someone will eventually try to exploit it.&lt;/p&gt;

&lt;p&gt;A proper pen test on a web application helps you find those flaws before an attacker does. Unlike surface-level scans, web app pen testing identifies issues that can lead to real-world breaches. These include things like broken access controls, logic flaws in business workflows, session hijacking, and authentication bypasses. Many of these issues are missed by automated scanners.&lt;/p&gt;

&lt;p&gt;Web application penetration testing also helps you meet compliance requirements. Standards like PCI-DSS, HIPAA, SOC 2, and ISO 27001 either recommend or require regular pen testing for applications that handle sensitive data. For many companies, passing an audit is only part of the story. The real reason to invest in a pen test is to avoid the kind of incident that costs money, damages trust, and takes months to recover from.&lt;/p&gt;

&lt;p&gt;If you care about protecting your users, your brand, or your bottom line, a real web pen testing process is not optional. It’s a necessity.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Are the 5 Stages of a Web Application Pentest?
&lt;/h2&gt;

&lt;p&gt;A professional web application penetration test follows a structured methodology. This ensures consistency, depth, and accurate risk assessment. While tools and techniques may vary, most pentesting engagements follow five key stages.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkf59cvhb5p1rk9t08jnr.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkf59cvhb5p1rk9t08jnr.jpg" alt="Infographic showing the five stages of a web application penetration test: Recon, Enumeration, Exploitation, Post-Exploitation, and Reporting, with icons and arrows on a dark blue tech background" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;1. Reconnaissance&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;In this phase, we gather as much information as possible about the target application. This includes identifying domains, endpoints, technologies, exposed APIs, and potential user roles. Passive techniques like reviewing public code repositories or archived web content can also reveal valuable insights.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;2. Enumeration&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Once we understand the surface area, we begin probing for weaknesses. This involves mapping the entire application and testing inputs, parameters, access control logic, and session behavior. Automated tools might assist here, but the real value comes from manual exploration.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;3. Exploitation&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;This is where the test moves from observation to action. We attempt to exploit the vulnerabilities we found, simulating what a real attacker would do. This could include SQL injection, cross-site scripting, file upload abuse, or access control bypass. Our goal is to prove the risk, not just list theoretical flaws.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;4. Post-Exploitation&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;If exploitation is successful, we assess what could be done next. Could sensitive data be exfiltrated? Could an attacker maintain access? This phase helps prioritize which vulnerabilities truly matter to the business.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;5. Reporting&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Finally, we document everything in a detailed, actionable report. This includes each finding, its business impact, clear remediation steps, and supporting evidence. At Artifice Security, we also walk clients through the findings to ensure nothing gets lost in translation.&lt;/p&gt;

&lt;p&gt;This process transforms a generic scan into a true pen test on a web application. It gives you more than a report, it gives you insight.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Tools Are Used in Web App Pen Testing?
&lt;/h2&gt;

&lt;p&gt;Tools are a big part of any web application penetration testing process, but they are only as effective as the person using them. Real pentesters don’t rely on tools to do the job, they use them to assist with discovery, exploitation, and verification.&lt;/p&gt;

&lt;p&gt;At Artifice Security, we use a combination of open-source and commercial tools during our web app pen testing engagements. Some of the most common include:&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffwsbl9i31cene6qg7s59.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffwsbl9i31cene6qg7s59.jpg" alt="BurpSuite Pro interface showing Repeater and Intruder tabs used during manual web application penetration testing" width="800" height="442"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://portswigger.net/burp/pro" rel="noopener noreferrer"&gt;Burp Suite Pro&lt;/a&gt;&lt;/strong&gt;: This is our primary platform for intercepting and modifying HTTP requests, testing authentication flows, fuzzing parameters, and automating parts of the process. Burp Suite for web apps is one of the most trusted tools in the industry.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://sqlmap.org/" rel="noopener noreferrer"&gt;SQLMap&lt;/a&gt;:&lt;/strong&gt; For testing SQL injection vulnerabilities, SQLMap is incredibly efficient. It automates the process of detecting and exploiting SQLi, but we still validate and tune the output manually.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;&lt;a href="https://nmap.org/" rel="noopener noreferrer"&gt;Nmap&lt;/a&gt;:&lt;/strong&gt; While often used in network testing, Nmap can help identify exposed services that are tied to web application infrastructure, such as admin panels or misconfigured development ports.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Custom scripts and payload generators:&lt;/strong&gt; No tool covers everything. That’s why manual web application security testing often requires writing or modifying scripts to handle edge cases or exploit logic flaws specific to a client’s app.&lt;br&gt;
Other tools: We also use tools like wfuzz, ffuf, JWT.io, Postman, and browser-based dev tools for specific testing needs.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Using these tools helps us identify vulnerabilities quickly and efficiently, but they never replace human logic. Automated scanners miss critical flaws because they can’t reason through workflows or spot context-specific weaknesses. The real value comes from how experienced pentesters apply these tools during a manual test.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Vulnerabilities Are Usually Found?
&lt;/h2&gt;

&lt;p&gt;Most web applications have security flaws, even the well-maintained ones. During a web application penetration test, we often find vulnerabilities that range from common misconfigurations to serious issues that could lead to full account takeover or data breaches.&lt;/p&gt;

&lt;p&gt;Here are some of the most frequent findings we uncover during manual web app pen testing:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SQL Injection (SQLi):&lt;/strong&gt; This allows attackers to manipulate backend database queries. If exploited, it can lead to data theft, data modification, or even complete database compromise.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-Site Scripting (XSS):&lt;/strong&gt; A vulnerability that lets attackers inject malicious scripts into web pages. These scripts often run in other users’ browsers and can be used to steal credentials or hijack sessions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Broken Access Control:&lt;/strong&gt; When users can access data or functions they shouldn’t. This might include viewing another user’s account, accessing admin features, or modifying restricted resources.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Insecure Direct Object References (IDOR):&lt;/strong&gt; A common logic flaw where users can manipulate input (like IDs in URLs) to access data that belongs to someone else.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Misconfiguration:&lt;/strong&gt; Default credentials, exposed debug endpoints, and outdated libraries fall into this category. These are often easy to find and easy to exploit.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Path Traversal:&lt;/strong&gt; A vulnerability that allows attackers to access files outside the intended directory, potentially exposing source code, system configuration files, or logs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-Site Request Forgery (CSRF):&lt;/strong&gt; A flaw that tricks users into performing actions they didn’t intend, often by embedding malicious links in emails or third-party sites.&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frrtov4k7chxmt4styxh9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frrtov4k7chxmt4styxh9.jpg" alt="Stylized cybersecurity illustration showing an XSS alert pop-up and an IDOR vulnerability in a browser window with a targeted user URL, observed by a hooded figure on a dark blue tech-themed background" width="800" height="725"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;These are just a few examples, and what we find depends heavily on how your web application was built. Vulnerabilities vary by framework, developer habits, and how third-party libraries are implemented. That’s why penetration testing on web applications must be tailored and hands-on. Scanners may flag some of these issues, but they often miss the deeper problems hiding in your business logic.&lt;/p&gt;




&lt;h2&gt;
  
  
  Can You Just Use a Scanner Instead of a Pentester?
&lt;/h2&gt;

&lt;p&gt;Scanners are useful. They can quickly identify low-hanging fruit like missing security headers, outdated components, or basic misconfigurations. But they can’t tell you whether an attacker can break your authentication system or access sensitive data through a flawed business logic path.&lt;/p&gt;

&lt;p&gt;For example, a scanner might detect that your site uses HTTP instead of HTTPS. A real pentest on a web application might reveal that an attacker could chain that with a session fixation issue and compromise user accounts. That difference can mean everything.&lt;/p&gt;

&lt;p&gt;A vulnerability scanner works like a checklist. It flags known patterns and signatures. That’s valuable, but it only tells part of the story. Web application penetration testing is different. A human tester looks at how your application behaves, how roles interact, and how seemingly minor flaws might be combined to create a major security risk.&lt;/p&gt;

&lt;p&gt;Scanners also don’t handle custom authentication flows, single sign-on, multi-step transactions, or non-standard APIs very well. In modern apps, these are common and often where the real issues hide.&lt;/p&gt;

&lt;p&gt;If you’re only relying on automated scans, you’re getting an incomplete picture. Manual web app pen testing gives you the full story and it’s the only way to truly understand your exposure.&lt;/p&gt;




&lt;h2&gt;
  
  
  How Much Does Web Application Penetration Testing Cost?
&lt;/h2&gt;

&lt;p&gt;The cost of a web application penetration test depends on several factors. These include the size and complexity of your app, how many user roles and features need to be tested, whether you want authenticated testing, and how deeply you want the engagement to go. In general, a manual pen test for a web application can range from a few thousand dollars for a simple app to over ten thousand for a large enterprise-grade system.&lt;/p&gt;

&lt;p&gt;It’s important to understand what you’re paying for. A proper penetration test on a web application involves more than just running a scanner and sending you a list of findings. It means a skilled human will spend hours (multiple days or sometimes weeks) manually probing your app, replicating attacker behavior, and verifying each issue’s impact. The result is a detailed report with real insight, not just a PDF full of automated scan output.&lt;/p&gt;

&lt;p&gt;At Artifice Security, we scope every engagement individually to make sure clients only pay for what they actually need. Whether you’re looking for a targeted test on a new feature or a full web app penetration test from login to logout, we’ll help you understand what makes sense for your goals and your budget.&lt;/p&gt;

&lt;p&gt;If you’re curious what a test would cost for your specific app, &lt;a href="https://artificesecurity.com/contact/" rel="noopener noreferrer"&gt;get in touch with us&lt;/a&gt; for a quick consultation. We’ll give you a real answer, not a sales pitch.&lt;/p&gt;




&lt;h2&gt;
  
  
  How Does Manual Testing Actually Work?
&lt;/h2&gt;

&lt;p&gt;Manual web application penetration testing is exactly what it sounds like. It is a skilled human methodically testing your app by hand. This is what separates a true penetration test from a vulnerability scan.&lt;/p&gt;

&lt;p&gt;When we test a web application manually, we start by mapping out its structure, identifying all the endpoints, forms, user roles, and key workflows. We look at how data moves through the app, how authentication and sessions are handled, and where logic flaws might exist. We test common attack vectors, but we also test for uncommon ones such as the edge cases that scanners miss because they require context, creativity, or chaining multiple steps together.&lt;/p&gt;

&lt;p&gt;For example, we might notice that two separate features don’t seem risky on their own, but when combined, they allow for unauthorized access or data exposure. We test for things like broken access control, parameter manipulation, and privilege escalation by actually trying to exploit them. If something looks exploitable, we prove it.&lt;/p&gt;

&lt;p&gt;Throughout the process, we document our steps, capture evidence, and assess real-world impact. Pen testing for web applications is as much about thinking like an attacker as it is about knowing the tools.&lt;/p&gt;

&lt;p&gt;The outcome is more than just a vulnerability list. You get a full picture of how secure your app really is and what you need to fix to keep attackers out.&lt;/p&gt;




&lt;h2&gt;
  
  
  Do You Need Web App Testing for Compliance?
&lt;/h2&gt;

&lt;p&gt;In many industries, web application penetration testing isn’t just recommended, it’s required. Regulatory standards like PCI-DSS, HIPAA, SOC 2, and ISO 27001 all include requirements or strong guidance around regular penetration testing for systems that handle sensitive data.&lt;/p&gt;

&lt;p&gt;If your web application processes payments, stores health records, manages customer information, or interacts with regulated data in any way, there’s a good chance you’re expected to test its security on a recurring basis. Auditors want to see that you’ve taken steps to validate your defenses, not just assume they work.&lt;/p&gt;

&lt;p&gt;But here’s what many companies miss: compliance isn’t the same as security. A checkbox scan won’t uncover the kinds of logic flaws or chained exploits that attackers look for. That’s why most frameworks explicitly or implicitly recommend manual penetration testing on web applications, not just automated tools.&lt;/p&gt;

&lt;p&gt;At &lt;a href="https://artificesecurity.com/" rel="noopener noreferrer"&gt;Artifice Security&lt;/a&gt;, we help clients meet their compliance requirements without losing sight of the bigger picture. A well-executed web app pen testing engagement supports audit readiness, risk reduction, and peace of mind all at once.&lt;/p&gt;

&lt;p&gt;If you’re not sure whether your business needs a penetration test for compliance purposes, &lt;a href="https://artificesecurity.com/contact/" rel="noopener noreferrer"&gt;we can help you&lt;/a&gt; figure it out, and we’ll explain it in plain language.&lt;/p&gt;




&lt;h2&gt;
  
  
  Real-World Case Example
&lt;/h2&gt;

&lt;p&gt;During a recent web application penetration test, we evaluated four internal applications for a mid-sized SaaS company. The engagement revealed multiple high-risk vulnerabilities that had been previously missed by automated tools.&lt;/p&gt;

&lt;p&gt;One of the most critical issues was a SQL injection vulnerability that allowed data to be extracted from the backend database without authentication. Using SQLMap, we confirmed that the application was vulnerable by sending time-based payloads and retrieving table and user data from staging environments. We were able to pull invite codes, session identifiers, and sensitive user records from exposed tables, all without logging into the system.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpi7fg4b9fc948knsn76v.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpi7fg4b9fc948knsn76v.jpg" alt="Stylized cybersecurity illustration showing a hooded figure at a laptop viewing a penetration test report with SQLMap command output and a highlighted SQL injection result, set against a dark blue circuit background" width="800" height="541"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;We also found that the application allowed cleartext password transmission over HTTP. By capturing traffic with Wireshark, we demonstrated that login credentials and API keys were being transmitted without encryption, making them easy to intercept on a public or shared network.&lt;/p&gt;

&lt;p&gt;Additional issues included weak password enforcement (allowing passwords like “1”), lack of account lockout, session hijacking through static tokens, and exposure of outdated JavaScript libraries with known vulnerabilities.&lt;/p&gt;

&lt;p&gt;These flaws were not hypothetical. We showed how they could be chained together to gain access to user accounts, view restricted content, and perform actions as other users. The client took immediate steps to remediate the issues, and we later confirmed that the fixes were effective during a follow-up retest.&lt;/p&gt;

&lt;p&gt;This is why manual web application penetration testing matters. A scanner might have flagged a few of these, but only a real test revealed how they could be used together to compromise the application.&lt;/p&gt;




&lt;h2&gt;
  
  
  How to Choose a Web Application Pentest Provider
&lt;/h2&gt;

&lt;p&gt;Not all penetration testing companies are created equal. Some vendors rely almost entirely on automated scanners, rebranding the output as a “pentest” and sending clients a generic PDF full of surface-level findings. That’s not real security testing, and it’s not what your business needs.&lt;/p&gt;

&lt;p&gt;When choosing a provider for web application penetration testing, look for a team that performs manual testing and explains how they simulate real-world attack scenarios. Ask about their methodology, whether they follow frameworks like OWASP or NIST, and whether they tailor their approach to your application’s architecture and business logic.&lt;/p&gt;

&lt;p&gt;You should also ask what tools they use, how they validate findings, and whether they exploit vulnerabilities to show actual impact. A good pentest should show you not just what’s broken, but how it could be exploited and how to fix it.&lt;/p&gt;

&lt;p&gt;Red flags to avoid:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reports that only list CVSS scores without context&lt;/li&gt;
&lt;li&gt;Firms that can’t explain their testing steps&lt;/li&gt;
&lt;li&gt;No manual exploitation or custom payload development&lt;/li&gt;
&lt;li&gt;Vague claims about “AI-driven testing” with no human involvement&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In fact, we made a whole article about &lt;a href="https://artificesecurity.com/penetration-testing-firms-red-flags/" rel="noopener noreferrer"&gt;red flags you should&lt;/a&gt; avoid from less than ethical companies.&lt;/p&gt;

&lt;p&gt;At Artifice Security, every pen test on a web application is manual, methodical, and tailored to your actual risk. We don’t rely on buzzwords or automated tools to do the job for us. We test the way attackers do, carefully, creatively, and thoroughly.&lt;/p&gt;




&lt;h2&gt;
  
  
  Get a Web App Penetration Test with Artifice Security
&lt;/h2&gt;

&lt;p&gt;If you’re building or maintaining a web application, don’t leave your security up to guesswork or surface-level scans. Attackers don’t rely on automated tools alone, and neither should you.&lt;/p&gt;

&lt;p&gt;At Artifice Security, we perform real, manual web application penetration testing that uncovers the flaws scanners miss. We simulate the same techniques used by attackers to help you find and fix issues before they become breaches.&lt;/p&gt;

&lt;p&gt;Whether you need testing for compliance, internal risk management, or peace of mind, we’ll work with you to scope the right approach based on your app, your risk, and your goals.&lt;/p&gt;

&lt;p&gt;Let’s make sure your application is secure.&lt;br&gt;
&lt;strong&gt;&lt;a href="https://artifice-security.youcanbook.me/" rel="noopener noreferrer"&gt;Book a free consultation&lt;/a&gt;&lt;/strong&gt; or &lt;strong&gt;&lt;a href="https://artificesecurity.com/contact/" rel="noopener noreferrer"&gt;contact us here&lt;/a&gt;&lt;/strong&gt; to get started.&lt;/p&gt;




&lt;h2&gt;
  
  
  FAQ
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What does a web application penetration test include?&lt;/strong&gt;&lt;br&gt;
A proper web application penetration test includes manual testing of authentication, session management, access control, input validation, business logic, and API endpoints. It goes beyond scanning by simulating real-world attacks and verifying each vulnerability’s actual impact.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How often should web apps be penetration tested?&lt;/strong&gt;&lt;br&gt;
Most organizations should test their web applications at least once a year or after any major code changes, feature releases, or infrastructure upgrades. Compliance requirements may also dictate testing frequency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What’s the difference between manual and automated web app testing?&lt;/strong&gt;&lt;br&gt;
Automated tools scan for known issues but often miss logic flaws, chained vulnerabilities, and context-specific risks. Manual testing is performed by human experts who think like attackers and find what scanners can’t.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What’s the typical timeline for a web application penetration test?&lt;/strong&gt;&lt;br&gt;
A standard test usually takes 3 to 7 business days depending on the application’s size, complexity, and scope. Reporting and remediation support are typically delivered within a week after testing concludes.&lt;/p&gt;




&lt;h3&gt;
  
  
  About the Author
&lt;/h3&gt;

&lt;p&gt;Jason Zaffuto is the founder and lead consultant at Artifice Security, where he specializes in manual web application penetration testing and red team operations. With over 25 years of experience in IT, security, and military intelligence, Jason has worked on everything from internal network assessments to physical Red Team engagements for global enterprises, government agencies, and critical infrastructure.&lt;/p&gt;

&lt;p&gt;He holds a Master’s degree in Cybersecurity from Georgia Tech, a BS in Network Security, and certifications including OSWE, OSCP, OSCE, and CPSA. Before launching Artifice Security, Jason was a senior pentester at Rapid7 and a systems engineer for NASA and DHS. He brings deep technical expertise, tactical creativity, and real-world offensive experience to every assessment.&lt;/p&gt;




&lt;p&gt;To connect or book a consultation, visit &lt;a href="https://artificesecurity.com" rel="noopener noreferrer"&gt;ArtificeSecurity.com/contact&lt;/a&gt; or &lt;a href="https://artifice-security.youcanbook.me/" rel="noopener noreferrer"&gt;schedule a session&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>discuss</category>
      <category>learning</category>
    </item>
    <item>
      <title>What Is Kerberoasting? How Attackers Crack Service Account Passwords</title>
      <dc:creator>Jason </dc:creator>
      <pubDate>Thu, 05 Jun 2025 04:36:58 +0000</pubDate>
      <link>https://dev.to/artificesec/what-is-kerberoasting-how-attackers-crack-service-account-passwords-5039</link>
      <guid>https://dev.to/artificesec/what-is-kerberoasting-how-attackers-crack-service-account-passwords-5039</guid>
      <description>&lt;p&gt;&lt;strong&gt;TL;DR:&lt;/strong&gt;&lt;br&gt;
Kerberoasting is a post-exploitation technique used to extract and crack service account passwords in Active Directory. It’s fast, silent, and often leads directly to Domain Admin, which is why it remains a favorite method for ransomware groups. This post breaks down how it works, why it matters, and how you can detect and prevent it in your environment.&lt;/p&gt;




&lt;h2&gt;
  
  
  What is Kerberoasting?
&lt;/h2&gt;

&lt;p&gt;If you have never heard of Kerberoasting, you are not alone. Most executives and business leaders are unfamiliar with it until it shows up in a post-incident report.&lt;/p&gt;

&lt;p&gt;Kerberoasting targets a part of your internal infrastructure that is easy to overlook. It goes after service accounts, which are special user accounts created for systems and software, not people. These accounts often run your databases, backup tools, or internal apps. Since they operate in the background, service accounts are rarely reviewed and often use weak or outdated passwords.&lt;/p&gt;

&lt;p&gt;Here is where the problem starts. Once an attacker has access to your internal network, even using a basic domain user account with no special privileges, they can request encrypted password data for those service accounts. The system gives it to them by design. The attacker saves this data, takes it offline, and begins cracking the passwords using freely available tools. If any of those passwords are weak, they can unlock access to critical systems or even gain Domain Admin control.&lt;/p&gt;

&lt;p&gt;This process is called Kerberoasting, and it has become one of the most common ways attackers escalate privileges once they are inside. It does not require malware, exploit kits, or advanced tools. It takes advantage of how Active Directory works and how many organizations fail to enforce strong passwords and proper account hygiene.&lt;/p&gt;

&lt;p&gt;This technique is used in both real ransomware attacks and in manual penetration tests, because it reflects what would happen in an actual breach.&lt;/p&gt;




&lt;h2&gt;
  
  
  How Does a Kerberoasting Attack Work?
&lt;/h2&gt;

&lt;p&gt;Kerberoasting works because of how authentication is designed in Active Directory. The attacker does not need elevated access or special tools to start. They only need a valid domain user account, which can be obtained through phishing, a stolen VPN login, or other low-effort intrusion methods.&lt;/p&gt;

&lt;p&gt;Once inside, the attacker moves through four simple steps:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Log in as a basic domain user.&lt;/strong&gt;&lt;br&gt;
They do not need admin access. Any regular account in the domain will work. These can often be found or guessed using public data, credential stuffing, or social engineering.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Identify service accounts and request tickets.&lt;/strong&gt;&lt;br&gt;
Using a tool like Rubeus or GetUserSPNs.py, the attacker queries Active Directory for service accounts tied to SPNs (Service Principal Names) and immediately requests their encrypted Kerberos service tickets, known as TGS tickets. These tickets are encrypted using the password hash of the service account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Export those tickets and crack them offline.&lt;/strong&gt;&lt;br&gt;
Using tools like Hashcat or John the Ripper, the attacker attempts to brute force the password used to encrypt the ticket. If the password is weak or uses an outdated algorithm like RC4, this step can take only hours.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Use the cracked credentials to move deeper.&lt;/strong&gt;&lt;br&gt;
Once the attacker has a service account password, they check its permissions. If it has admin rights on any systems, which is often the case, they can log in, extract more credentials, or access sensitive data.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm2mi3khbuh64zc2n7rm0.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm2mi3khbuh64zc2n7rm0.jpg" alt="Dark-mode flowchart illustrating the Kerberoasting attack process, showing five glowing steps: Domain User, SPN Request, Service Ticket, Offline Cracking, and Privileged Access, over a cyber-themed circuit background." width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Imagine someone walks into your office building using a valid employee badge. They go to the front desk and request a copy of every service key used by internal departments. The receptionist hands them over without question, because the request follows normal protocol. Instead of trying the keys on doors right away, the person takes them to a private workshop, studies them, and makes duplicates. Once they figure out which key opens the most important doors, like the server room, they come back quietly and let themselves in.&lt;/p&gt;

&lt;p&gt;That is how Kerberoasting works. The attacker uses a normal domain account to request encrypted service tickets. They take those tickets offline, crack the passwords, and use any successful result to access systems with elevated privileges, all without triggering alerts.&lt;/p&gt;

&lt;p&gt;This entire process can be automated and done quietly. Most environments will not detect it unless specific logging and alerting are in place. That is what makes it so dangerous, especially in ransomware campaigns.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Is Kerberoasting Dangerous for Your Organization?
&lt;/h2&gt;

&lt;p&gt;Kerberoasting is dangerous because it turns one small gap in your internal defenses into a direct path toward full domain compromise. It does not require malware. It does not rely on software vulnerabilities. And it often works even in environments that appear to follow standard security practices. This makes it a favored method for ransomware operators and other threat actors who want to quietly escalate their access without being detected.&lt;/p&gt;

&lt;p&gt;Once an attacker cracks a service account password, they can begin moving laterally through the network. This means using that one account to access other systems, looking for more credentials, more access, and more control. Even if the cracked account is not a Domain Admin, it may still have local admin rights on key servers, access to backup data, or permissions that open new doors inside the network.&lt;/p&gt;

&lt;p&gt;To put it in context, most ransomware incidents begin with something simple like a weak password or a stolen VPN login. But that initial access is just the beginning. What happens after the attacker gets in is what really causes damage. Kerberoasting is one of the fastest and quietest ways to turn that foothold into complete control of your domain.&lt;/p&gt;

&lt;p&gt;This technique fits neatly into the second phase of an attack, where the goal is to escalate access and prepare for the final blow. Once the attacker gains Domain Admin, they can disable antivirus tools, access sensitive data, install persistence mechanisms, and launch a ransomware payload across hundreds of systems in minutes.&lt;/p&gt;

&lt;p&gt;The risk is not just the loss of one account. The danger comes from what that account connects to and how quickly that access can grow. Kerberoasting gives attackers a way to chain together weak passwords, misconfigured permissions, and poor visibility into a full-blown breach.&lt;/p&gt;

&lt;p&gt;For decision-makers, this is not just a technical flaw. It is a business risk that can lead to data loss, ransom payments, regulatory penalties, and long-term reputation damage. Ignoring it means giving attackers an easy and invisible path to your most sensitive systems.&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;💡 Real-World Threat. Real Fixes.&lt;br&gt;
Most Kerberoasting attacks don’t need exploits, they just need a single weak service account. A proper internal pentest shows you exactly how far someone could get in your environment before a real attacker does.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  What Tools Are Used in Kerberoasting Attacks?
&lt;/h2&gt;

&lt;p&gt;Kerberoasting does not require advanced malware or custom code. In fact, attackers often use freely available tools to perform every step of the attack. If they gain access to a Windows system inside your network, they may run a tool called &lt;a href="https://github.com/GhostPack/Rubeus" rel="noopener noreferrer"&gt;Rubeus&lt;/a&gt;, which allows them to interact with the Kerberos protocol and request service tickets. With just a few commands, Rubeus can list accounts tied to services, request the tickets, and export them for offline cracking.&lt;/p&gt;

&lt;p&gt;Rubeus is popular with threat actors because it runs directly on a Windows host and blends in with normal system activity. It uses PowerShell or can be compiled as an executable. Either way, it is fast, quiet, and effective.&lt;/p&gt;

&lt;p&gt;On the penetration testing side, we often use a tool called GetUserSPNs.py from the &lt;a href="https://github.com/fortra/impacket" rel="noopener noreferrer"&gt;Impacket framework&lt;/a&gt;. This tool performs the same actions from a Linux system like Kali. It queries the domain controller for any account associated with a Service Principal Name, requests the encrypted ticket, and saves it to a file for analysis. The process reflects exactly what a real attacker would do, but in a controlled and safe environment.&lt;/p&gt;

&lt;p&gt;There is also a module in &lt;a href="https://www.metasploit.com/" rel="noopener noreferrer"&gt;Metasploit&lt;/a&gt; called auxiliary/gather/get_user_spns that can perform this step as well. While Metasploit is best known for exploitation, its modules are often used to demonstrate proof of concept during internal security assessments.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6kqw6k9mghofgi6addsc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6kqw6k9mghofgi6addsc.png" alt="Stylized digital illustration of two terminal windows side by side on a dark cyber-themed background. The left window labeled 'Windows Environment' displays simulated service ticket data, while the right window labeled 'Linux Environment' shows mock SPN and hash values, representing Kerberoasting tools in Windows and Linux environments." width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;What these tools have in common is that they take advantage of normal, allowed behavior in a Windows domain. There is no exploit involved. The domain controller issues tickets because it is designed to. That is why tools like Rubeus and GetUserSPNs.py are so effective as they rely on built-in features and only need the kind of access most attackers can get early in an intrusion.&lt;/p&gt;

&lt;p&gt;For security leaders, this means the tools themselves are not the real issue. The real issue is weak passwords, outdated encryption, and lack of visibility. The tools just reveal what is already possible in your environment.&lt;/p&gt;




&lt;h2&gt;
  
  
  How Can You Detect and Prevent Kerberoasting?
&lt;/h2&gt;

&lt;p&gt;Kerberoasting is quiet by design. It uses legitimate features of Active Directory, so many environments do not detect it unless they are watching for very specific behaviors. That is part of what makes it so dangerous. It is not a virus, not a zero-day, and not something your firewall is going to block. It slips through unnoticed unless you know how to look for it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Detection starts with logging.&lt;/strong&gt; You need to collect and monitor Kerberos service ticket requests, especially when they involve accounts with Service Principal Names (SPNs). Windows Event ID 4769 can provide some visibility, but by default, most systems do not flag this as suspicious. What helps is correlating these requests with patterns, such as a low-privileged account making requests for multiple high-privilege service accounts in a short time span.&lt;/p&gt;

&lt;p&gt;Security tools like Microsoft Defender for Identity or SIEM platforms like Splunk or Sentinel can help detect these anomalies, but only if the right logs are being ingested and alerts are properly configured. Without that, the entire attack can unfold with no one noticing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prevention focuses on reducing the attack surface.&lt;/strong&gt; One of the most effective ways to block Kerberoasting is to use strong, complex passwords for all service accounts, especially those tied to SPNs. Passwords should be long (e.g. 24 characters), randomly generated, and changed regularly. If a password is too strong to crack in a reasonable amount of time, the attack becomes ineffective.&lt;/p&gt;

&lt;p&gt;Another key step is using AES-only encryption for service accounts instead of older, weaker algorithms like RC4. Attackers often succeed because the tickets they capture are encrypted with outdated ciphers that can be cracked quickly. Enforcing AES means the encryption is much harder to break, even if an attacker manages to capture the ticket.&lt;/p&gt;

&lt;p&gt;You can also reduce exposure by replacing traditional service accounts with &lt;a href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/group-managed-service-accounts/group-managed-service-accounts/group-managed-service-accounts-overview" rel="noopener noreferrer"&gt;Group Managed Service Accounts (gMSAs)&lt;/a&gt;. These are managed by the domain controller and use complex passwords that rotate automatically. They cannot be used to log in interactively and are not vulnerable to Kerberoasting in the same way.&lt;/p&gt;

&lt;p&gt;Finally, review and limit where your service accounts have admin rights. Many environments assign local admin access to service accounts on dozens of systems without realizing the risk. Just because a service needs to run on a server does not mean it needs elevated privileges everywhere.&lt;/p&gt;

&lt;p&gt;To stop Kerberoasting, you need to harden accounts, enforce modern encryption, reduce privilege sprawl, and monitor for unusual Kerberos activity. It is not one fix. It is a combination of controls that work together to shut down this attack path.&lt;/p&gt;




&lt;h2&gt;
  
  
  How Penetration Testing Identifies Kerberoasting Risks
&lt;/h2&gt;

&lt;p&gt;Kerberoasting is not something you can fully understand by looking at a checklist. It depends on real-world context, what accounts exist, how they are configured, where they have access, and how well they are protected. That is exactly why a manual penetration test is so valuable.&lt;/p&gt;

&lt;p&gt;During an &lt;a href="https://artificesecurity.com/what-are-the-processes-in-an-internal-network-penetration-test/" rel="noopener noreferrer"&gt;internal penetration test&lt;/a&gt;, we simulate the exact steps an attacker would take after gaining a foothold. If we are simulating a user-level compromise, one of the first things we do is look for service accounts tied to SPNs. Using tools like &lt;a href="https://github.com/trustedsec/orpheus/blob/main/GetUserSPNs.py" rel="noopener noreferrer"&gt;GetUserSPNs.py&lt;/a&gt;, we request service tickets from the domain controller and analyze the encryption type. If the tickets use weak ciphers or belong to accounts with short, guessable passwords, we attempt to crack them offline using tools like &lt;a href="https://hashcat.net/hashcat/" rel="noopener noreferrer"&gt;Hashcat&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The difference between this and a vulnerability scan is depth. A scanner might tell you that RC4 is still allowed or that a &lt;a href="https://artificesecurity.com/best-practices-for-your-password-policy/" rel="noopener noreferrer"&gt;password policy&lt;/a&gt; is weak, but it will not tell you if a service account password can actually be cracked and used to access other systems. A manual pentest shows you what is possible right now, not what might be risky in theory.&lt;/p&gt;

&lt;p&gt;We also test what happens next. If we successfully crack a service account password, we try to log in to systems where that account has access. If we can move laterally, escalate privileges, or reach sensitive data, we document every step. You see not just that a problem exists, but what someone could actually do with it.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F12ta7caxypkqu43l987y.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F12ta7caxypkqu43l987y.jpg" alt="Stylized penetration test report showing a cracked service account labeled 'sql-backup,' a high risk level warning, and suggested remediation steps including password change and AES encryption enforcement, displayed on a dark digital background." width="800" height="609"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;In your case, we already covered this in our previous post, &lt;a href="https://artificesecurity.com/can-a-penetration-test-prevent-ransomware/" rel="noopener noreferrer"&gt;Can a Penetration Test Prevent Ransomware?&lt;/a&gt;, where a Kerberoasting attack led directly to Domain Admin access. That was not hypothetical, it reflected exactly what could happen in many real environments.&lt;/p&gt;

&lt;p&gt;A proper penetration test does not stop at detection. It walks the same path an attacker would and gives you a clear report of what they would have found, how far they could have gone, and how to fix it.&lt;/p&gt;




&lt;h2&gt;
  
  
  Final Thoughts: Why This Attack Still Works in 2025
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Still Common. Still Effective. Still Preventable.&lt;/strong&gt;&lt;br&gt;
Kerberoasting continues to succeed not because it’s new, but because internal environments are rarely tested the way attackers move.&lt;br&gt;
At Artifice Security, we perform manual internal penetration tests that simulate real-world attacks like Kerberoasting. We identify weak service accounts, unsafe configurations, and paths to privilege escalation and we can help you shut them down before an attacker finds them.&lt;br&gt;
If you want a real test of your internal security, &lt;a href="https://artifice-security.youcanbook.me/" rel="noopener noreferrer"&gt;schedule a free consult &lt;/a&gt;or &lt;a href="https://artificesecurity.com/contact/" rel="noopener noreferrer"&gt;contact us here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;📧 &lt;a href="mailto:contact@artificesecurity.com"&gt;contact@artificesecurity.com&lt;/a&gt;&lt;br&gt;
📞 720-515-1337&lt;br&gt;
🔗 &lt;a href="https://artificesecurity.com" rel="noopener noreferrer"&gt;artificesecurity.com&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  About the Author
&lt;/h3&gt;

&lt;p&gt;Written by Jason Zaffuto, Founder of Artifice Security&lt;br&gt;
Jason is a veteran penetration tester with over 25 years of experience in IT, electronics, and offensive security. He served in the U.S. Army as a Military Intelligence Systems Maintainer and later worked in red team operations for both the military and private sector. He holds several degrees in electronics and Cybersecurity and has led engagements for Fortune 500s, critical infrastructure, and government agencies. Today, he leads Artifice Security, helping clients identify and fix the exact weaknesses ransomware attackers exploit.&lt;/p&gt;




&lt;h2&gt;
  
  
  FAQ
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What is Kerberoasting in cybersecurity?&lt;/strong&gt;&lt;br&gt;
Kerberoasting is a technique where attackers request encrypted service tickets from Active Directory using a normal user account. These tickets can be taken offline and cracked to reveal the passwords of service accounts. If those accounts have elevated privileges, attackers can use them to access sensitive systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Can Kerberoasting be detected?&lt;/strong&gt;&lt;br&gt;
Yes, but it requires specific monitoring. You need to log and analyze Kerberos ticket requests, especially Event ID 4769. Unusual patterns, like a regular user account requesting multiple service tickets in a short time, may signal Kerberoasting activity. Most environments do not alert on this by default.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How do pentesters simulate Kerberoasting?&lt;/strong&gt;&lt;br&gt;
Penetration testers use tools like GetUserSPNs.py from the Impacket framework or the Metasploit module get_user_spns to request service tickets. They then try to crack those tickets offline using tools like Hashcat. If successful, they use the cracked credentials to test lateral movement and privilege escalation, just like a real attacker would.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What are the best defenses against Kerberoasting?&lt;/strong&gt;&lt;br&gt;
The most effective defenses include enforcing strong passwords for all service accounts, switching to AES-only encryption, using Group Managed Service Accounts (gMSAs), and reducing unnecessary privileges. Monitoring for unusual Kerberos activity is also essential for early detection.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>discuss</category>
      <category>vulnerabilities</category>
    </item>
    <item>
      <title>Can a Penetration Test Prevent Ransomware? What Most Companies Miss</title>
      <dc:creator>Jason </dc:creator>
      <pubDate>Thu, 05 Jun 2025 02:36:48 +0000</pubDate>
      <link>https://dev.to/artificesec/can-a-penetration-test-prevent-ransomware-what-most-companies-miss-3gm3</link>
      <guid>https://dev.to/artificesec/can-a-penetration-test-prevent-ransomware-what-most-companies-miss-3gm3</guid>
      <description>&lt;p&gt;&lt;strong&gt;TL;DR:&lt;/strong&gt;&lt;br&gt;
Yes, a penetration test can help prevent ransomware. Not by blocking it directly, but by identifying the same weaknesses attackers use to gain access. These can be things like weak service account passwords, lack of MFA, poor internal segmentation, and exposed attack paths like Kerberoasting. In this post, I’ll break down how a real ransomware attack unfolded and show how a manual penetration test would have stopped it before it spread.&lt;/p&gt;




&lt;p&gt;Ransomware attacks keep making headlines, but most don’t rely on advanced exploits or nation-state-level tools. They often start with simple issues like a weak password, an unprotected VPN, or an overlooked service account. This post answers a critical question many companies are asking: can a penetration test prevent ransomware before it happens? The answer is yes, if it’s done right.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmm7zpinn34sj9iaf56hh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmm7zpinn34sj9iaf56hh.jpg" alt="Flowchart showing the stages of a ransomware attack: VPN access, Kerberoasting, cracked service account, Domain Admin access, and final ransomware deployment." width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  How Do Ransomware Attacks Usually Start?
&lt;/h2&gt;

&lt;p&gt;Most ransomware attacks don’t begin with some elite-level hack. They start with something simple: a weak password, a misconfigured VPN, or credentials stolen from a past breach. In this &lt;a href="https://reliaquest.com/blog/blacksuit-attack-analysis/" rel="noopener noreferrer"&gt;real-world case&lt;/a&gt;, the attacker gained access through a VPN gateway that didn’t require multi-factor authentication. It was a backup system at a disaster recovery site, overlooked during configuration. That single gap gave them an initial foothold.&lt;/p&gt;

&lt;p&gt;Once inside, the attackers spent the next week moving laterally across multiple Windows systems using &lt;a href="https://learn.microsoft.com/en-us/sysinternals/downloads/psexec" rel="noopener noreferrer"&gt;PsExec&lt;/a&gt;, a legitimate remote admin tool already in use by the company. There were no advanced exploits here. They simply used what was already available in the environment.&lt;/p&gt;

&lt;p&gt;After about ten days, they pivoted to a Windows server and quietly loaded a tool called &lt;a href="https://github.com/GhostPack/Rubeus" rel="noopener noreferrer"&gt;Rubeus&lt;/a&gt; through PowerShell. With it, they launched an attack called &lt;a href="https://artificesecurity.com/what-is-kerberoasting/" rel="noopener noreferrer"&gt;Kerberoasting&lt;/a&gt;, which let them request encrypted service account credentials from Active Directory. One of the cracked accounts, “admin1,” turned out to be a Domain Admin.&lt;/p&gt;

&lt;p&gt;From there, things escalated quickly. The attackers dumped the NTDS.dit file, which holds every password in the domain, and exfiltrated over 100GB of data using &lt;a href="https://winscp.net/eng/index.php" rel="noopener noreferrer"&gt;WinSCP&lt;/a&gt;. Finally, they deployed ransomware across the network using PsExec and WMIC, copying the payload to hundreds of systems from a VirtualBox VM they spun up just for the job.&lt;/p&gt;

&lt;p&gt;This entire compromise could have been prevented if the right security controls had been tested ahead of time. That is exactly where a real penetration test becomes critical.&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;Most ransomware breaches do not use advanced exploits. They rely on overlooked basics.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  What Is Kerberoasting and Why Should You Care?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://artificesecurity.com/what-is-kerberoasting/" rel="noopener noreferrer"&gt;Kerberoasting&lt;/a&gt; is a technique attackers use to extract encrypted passwords for service accounts in Active Directory. What makes it especially dangerous is that it requires no elevated privileges. As long as an attacker has any valid domain user account, even one with no special access, they can run this attack and try to crack the passwords offline.&lt;/p&gt;

&lt;p&gt;A service account is a user account used by automated tasks or services like SQL Server, backup software, or internal apps. These accounts are often overlooked in routine password audits and may have broad access across the environment. Because they are tied to SPNs (Service Principal Names), they can be identified and targeted using built-in domain queries.&lt;/p&gt;

&lt;p&gt;Here’s how Kerberoasting works:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The attacker logs in using a basic domain user account.&lt;/li&gt;
&lt;li&gt;They scan the domain for accounts with SPNs. In most environments, these are service accounts.&lt;/li&gt;
&lt;li&gt;Active Directory returns encrypted service tickets (TGS tickets) for those accounts by default.&lt;/li&gt;
&lt;li&gt;The attacker saves those tickets and attempts to crack them offline using tools like Hashcat or John the Ripper.&lt;/li&gt;
&lt;li&gt;If the service account password is weak or uses outdated encryption like RC4, cracking it can be fast and reliable.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1fxy0vj5x0trg7f4ku60.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1fxy0vj5x0trg7f4ku60.jpg" alt="Infographic illustrating the Kerberoasting attack process, showing a domain user requesting an SPN, receiving a TGS ticket, and performing offline cracking to extract service account credentials." width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;In this case, the attackers succeeded because the password for the service account they targeted was weaker than it should have been. Once they cracked it, they gained Domain Admin access and took full control of the environment.&lt;/p&gt;

&lt;p&gt;During a penetration test, this is one of the exact techniques we use to simulate real-world attacks. While ransomware operators often use tools like &lt;a href="https://github.com/GhostPack/Rubeus" rel="noopener noreferrer"&gt;Rubeus&lt;/a&gt; inside a Windows environment, we typically use GetUserSPNs.py from the &lt;a href="https://github.com/fortra/impacket" rel="noopener noreferrer"&gt;Impacket&lt;/a&gt; toolkit on &lt;a href="https://www.kali.org/" rel="noopener noreferrer"&gt;Kali Linux&lt;/a&gt; to do the same thing. Both approaches allow us to find service accounts vulnerable to Kerberoasting and provide clear guidance to fix the issue before an attacker can exploit it.&lt;/p&gt;

&lt;p&gt;This is a practical attack method used by both real threat actors and ethical hackers. It is one of many reasons why a penetration test can prevent ransomware by exposing overlooked internal weaknesses that attackers often rely on.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Happens If a Service Account Gets Compromised?
&lt;/h2&gt;

&lt;p&gt;When attackers crack a service account password, the real danger begins. Even if that account is not a Domain Admin, it might still have local administrator rights on multiple systems. That means the attacker can start moving laterally across the network, hopping from one machine to another, looking for more credentials, access, and opportunity.&lt;/p&gt;

&lt;p&gt;Lateral movement is the process of using one compromised system to access another. You can think of it like someone finding a key to one office in a building, and then discovering that key opens ten more. Each time they open a new door, they gain more visibility and more tools to work with.&lt;/p&gt;

&lt;p&gt;This is often all it takes to get Domain Admin access. Once the attacker lands on a system where a Domain Admin account has logged in recently, they can use tools like &lt;a href="https://www.offsec.com/metasploit-unleashed/mimikatz/" rel="noopener noreferrer"&gt;Mimikatz&lt;/a&gt; or LSASS dumpers to extract credentials directly from memory. From there, full control of the environment is usually only a step or two away.&lt;/p&gt;

&lt;p&gt;In the case we’re describing, one cracked service account led directly to a Domain Admin. But even if it hadn’t, the attacker could have still pivoted through the network, escalating slowly until they reached the same goal.&lt;/p&gt;

&lt;p&gt;A good penetration test will simulate this exact process. After identifying vulnerable service accounts, we check whether they can be used to access other systems and gain additional privileges. If we can move laterally using a cracked service account, we flag it immediately and provide guidance to fix it. This is another clear way a &lt;a href="https://artificesecurity.com/services/" rel="noopener noreferrer"&gt;penetration test&lt;/a&gt; can prevent ransomware, by identifying the internal escalation paths that most companies never realize exist.&lt;/p&gt;




&lt;h2&gt;
  
  
  Can a Penetration Test Help Prevent Ransomware?
&lt;/h2&gt;

&lt;p&gt;Yes. A well-executed penetration test can absolutely help prevent ransomware. It does this by simulating the same steps an attacker would take after gaining initial access. Instead of waiting for someone with malicious intent to find the gaps, a manual penetration test exposes those weaknesses first, with clear steps on how to fix them.&lt;/p&gt;

&lt;p&gt;In the attack we’ve been walking through, the threat actors got in using a basic VPN login, escalated privileges using Kerberoasting, and then moved laterally across the environment until they had full control. These steps are not unique to ransomware gangs. They are common tactics used in everyday penetration tests.&lt;/p&gt;

&lt;p&gt;Here’s how a good internal pentest works in a similar scenario:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We start with no access, user-level access, or simulate it.&lt;/li&gt;
&lt;li&gt;We attempt to identify service accounts using tools like GetUserSPNs.py.&lt;/li&gt;
&lt;li&gt;We try to extract and crack Kerberos tickets offline.&lt;/li&gt;
&lt;li&gt;If successful, we test whether that account gives us admin access to other systems.&lt;/li&gt;
&lt;li&gt;We follow the same logic an attacker would: try to harvest credentials, pivot, and escalate.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The difference is that we stop there. Instead of launching ransomware or stealing data, we deliver a report that tells you exactly what happened, how far we got, and how to stop it from ever happening in the real world.&lt;/p&gt;

&lt;p&gt;This kind of test goes far beyond what a vulnerability scanner would catch. A scanner might tell you that SMB signing is disabled, or that a patch is missing. But a manual pentest tells you what an attacker could actually do with that information.&lt;/p&gt;

&lt;p&gt;If your goal is to prevent ransomware from locking down your environment, then simulating the attacker’s path is the only reliable way to see where your defenses fall short. That’s why a penetration test can prevent ransomware, not by guessing, but by proving what needs to be fixed before someone malicious finds it.&lt;/p&gt;




&lt;h2&gt;
  
  
  What’s the Difference Between a Vulnerability Scan and a Penetration Test?
&lt;/h2&gt;

&lt;p&gt;A vulnerability scan checks your systems for known issues like missing patches, outdated software, or open ports. It compares your environment against a list of known vulnerabilities and reports what it finds. That’s useful, but it only tells you what is exposed — not what can actually be exploited.&lt;/p&gt;

&lt;p&gt;A penetration test takes it further. Instead of listing vulnerabilities, it simulates what a real attacker would do with them. It shows how someone could chain small issues together, escalate privileges, move across the network, and reach critical assets. That is a big difference.&lt;/p&gt;

&lt;p&gt;For example, a scanner might tell you that SMB signing is not enforced. A penetration test will show you that an attacker can use that gap to run &lt;a href="https://www.qomplx.com/blog/qomplx-knowledge-ntlm-relay-attacks-explained/" rel="noopener noreferrer"&gt;NTLM relay attacks&lt;/a&gt; or impersonate users. A scanner might note that a service account password is old. A tester will show you that it can be cracked and used to access dozens of systems.&lt;/p&gt;

&lt;p&gt;Another key difference is how each approach deals with context. &lt;a href="https://artificesecurity.com/scanning-for-vulnerabilities-popular-scanning-tools/" rel="noopener noreferrer"&gt;Vulnerability scanners&lt;/a&gt; see every issue in isolation. Pentesters see the relationships between them. They find paths an attacker would actually follow, not just items on a checklist.&lt;/p&gt;

&lt;p&gt;This is why there is no such thing as an “automated penetration test.” Tools like &lt;a href="https://www.tenable.com/products/nessus" rel="noopener noreferrer"&gt;Nessus&lt;/a&gt; or &lt;a href="https://github.com/greenbone/openvas-scanner" rel="noopener noreferrer"&gt;OpenVAS&lt;/a&gt; are scanners. They are helpful for hygiene but not for security validation. If a company tells you they provide automated pentesting, what they’re really offering is a scan with a marketing wrapper.&lt;/p&gt;

&lt;p&gt;If you want more insight into the difference, check out our guide: &lt;a href="https://artificesecurity.com/penetration-testing-firms-red-flags/" rel="noopener noreferrer"&gt;Penetration Testing Firms: 10 Red Flags Every Business Should Know&lt;/a&gt;. It breaks down what real testing looks like, and how to avoid paying for a report that doesn’t actually help.&lt;/p&gt;

&lt;p&gt;A scanner might give you a list. A manual penetration test gives you proof, context, and clear guidance to reduce risk. That is exactly what you need if you want to prevent ransomware and stop attackers before they get inside.&lt;/p&gt;




&lt;h2&gt;
  
  
  How Would You Know If Your Network Was at Risk?
&lt;/h2&gt;

&lt;p&gt;Most companies think they’re doing fine until something breaks. But in many environments, attackers are able to move freely not because the network is wide open, but because the right tests were never done to expose what’s quietly misconfigured or forgotten.&lt;/p&gt;

&lt;p&gt;If you haven’t tested your internal network with a &lt;a href="https://artificesecurity.com/services/" rel="noopener noreferrer"&gt;manual penetration test&lt;/a&gt;, the truth is that you likely don’t know how exposed you are. Most environments don’t generate alerts when Kerberoasting happens. Many still allow VPN access without enforcing multi-factor authentication. And far too many service accounts have not had their passwords changed in years.&lt;/p&gt;

&lt;p&gt;Here are a few examples of the kinds of findings that might show up in a strong internal pentest report. The image below is a sample excerpt from a real-world report format showing a variety of risks.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqkyz9hgeedmeljwp4gp8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqkyz9hgeedmeljwp4gp8.jpg" alt="Sample penetration test findings table showing assessment issues such as weak passwords, insecure configurations, and risk levels ranging from low to critical." width="639" height="591"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;These are not rare. We see them constantly, even in organizations with decent external security posture. And attackers know that once they are inside, these gaps often go unnoticed.&lt;/p&gt;

&lt;p&gt;A real internal pentest checks for exactly these risks. We look at account hygiene, privilege assignments, network structure, and monitoring. More importantly, we don’t just check for these issues, we attempt to use them the same way an attacker would. If we can compromise a service account or move laterally to a domain controller, you’ll know about it in the report.&lt;/p&gt;

&lt;p&gt;Knowing your risk means not guessing. It means validating your controls from the inside, just like ransomware groups do. That is what a proper penetration test provides.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Would a Good Pentest Report Actually Show You?
&lt;/h2&gt;

&lt;p&gt;A good penetration test report does more than list problems. It tells a story. It shows how a real attacker could move through your environment, where they would start, what they would find, and how far they could go.&lt;/p&gt;

&lt;p&gt;This kind of report is built on real attack paths, not guesses or theoretical issues. If we find a service account that can be Kerberoasted and cracked, we document it. If that cracked account gives us local admin rights on multiple machines, we show how that access can be used to pivot deeper into the network.&lt;/p&gt;

&lt;p&gt;Here are a few examples of the kinds of findings that might show up in a strong internal pentest report:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;A weak service account password&lt;/strong&gt; that allowed offline cracking in under 12 hours&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;A VPN portal without multi-factor authentication&lt;/strong&gt; that accepted simple credentials&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;A lack of alerting on lateral movement&lt;/strong&gt;, such as PsExec or remote desktop activity across high-value systems&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But the value is not just in identifying problems. The report should tell you exactly what to do next. That includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Which accounts to rotate or decommission&lt;/li&gt;
&lt;li&gt;How to enforce stronger encryption and password policies&lt;/li&gt;
&lt;li&gt;Where to improve segmentation or privilege boundaries&lt;/li&gt;
&lt;li&gt;What types of monitoring and logging to enable or tighten&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Findings are prioritized by risk and ease of exploitation. You’ll know what needs to be fixed right away versus what can be scheduled for future hardening.&lt;/p&gt;

&lt;p&gt;This is how you translate security testing into meaningful outcomes. You’re not just checking a box. You’re giving your team a focused list of actions that directly reduce the risk of a ransomware event. A good pentest report does not just diagnose the issues, it gives you a plan to protect the business.&lt;/p&gt;




&lt;h2&gt;
  
  
  Can a Pentest Really Stop a Breach from Happening?
&lt;/h2&gt;

&lt;p&gt;A penetration test cannot guarantee you will never be breached. But it can stop most attacks before they start, especially the ones that rely on common missteps like weak passwords, poor segmentation, or unmonitored lateral movement.&lt;/p&gt;

&lt;p&gt;Most ransomware cases do not involve advanced exploits. They succeed because nobody was looking internally. A good pentest fixes that. It simulates the attacker’s perspective inside your environment and shows you what would happen if someone got in.&lt;/p&gt;

&lt;p&gt;When we run a manual internal pentest, we simulate the exact steps a ransomware operator would take. We look for vulnerable service accounts, test privilege escalation paths, attempt Kerberoasting, and try to move laterally. Each step tests whether real-world attack paths like Kerberoasting or lateral movement are possible in your network right now.&lt;/p&gt;

&lt;p&gt;If we can find it, so can they. The difference is that we give you a chance to fix it first.&lt;/p&gt;

&lt;p&gt;That is the point of a good penetration test. It is not just about finding flaws. It is about showing how to prevent those flaws from becoming the reason your business ends up in the news.&lt;/p&gt;




&lt;h2&gt;
  
  
  Don’t Wait for a Breach to Learn Where You're Exposed
&lt;/h2&gt;

&lt;p&gt;If attackers can get Domain Admin starting from a low-privilege account and a service ticket, the real question is: have you tested whether they could do it in your environment?&lt;/p&gt;

&lt;p&gt;At Artifice Security, we simulate real ransomware attack paths from Kerberoasting and lateral movement to privilege escalation and exfiltration. We test safely, manually, and give you clear steps to fix what matters before it’s exploited.&lt;/p&gt;

&lt;p&gt;If you're relying on scans, you're not testing the same way attackers operate.&lt;/p&gt;

&lt;p&gt;Let’s find the gaps before someone else does.&lt;/p&gt;

&lt;p&gt;📧 &lt;a href="mailto:contact@artificesecurity.com"&gt;contact@artificesecurity.com&lt;/a&gt;&lt;br&gt;
📞 720-515-1337&lt;br&gt;
🔗 artificesecurity.com&lt;/p&gt;




&lt;h3&gt;
  
  
  About the Author
&lt;/h3&gt;

&lt;p&gt;Written by Jason Zaffuto, Founder of Artifice Security&lt;br&gt;
Jason is a veteran penetration tester with over 25 years of experience in IT, electronics, and offensive security. He served in the U.S. Army as a Military Intelligence Systems Maintainer and later worked in red team operations for both the military and private sector. He holds several degrees in electronics and Cybersecurity and has led engagements for Fortune 500s, critical infrastructure, and government agencies. Today, he leads Artifice Security, helping clients identify and fix the exact weaknesses ransomware attackers exploit.&lt;/p&gt;




&lt;h2&gt;
  
  
  FAQ
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Can a penetration test prevent ransomware?&lt;/strong&gt;&lt;br&gt;
Yes. A penetration test can help prevent ransomware by identifying and simulating the same internal weaknesses that attackers rely on. That includes weak service account passwords, poor network segmentation, and missing multi-factor authentication. A good pentest reveals these issues before someone else uses them against you.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Kerberoasting in Active Directory?&lt;/strong&gt;&lt;br&gt;
Kerberoasting is a technique where an attacker with a valid domain user account requests encrypted service tickets from Active Directory. These tickets can be cracked offline to recover service account passwords. If those accounts have high privileges, the attacker can escalate access quickly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Are vulnerability scans the same as penetration tests?&lt;/strong&gt;&lt;br&gt;
No. Vulnerability scans identify known issues using automated tools. A penetration test uses human logic to chain misconfigurations together and simulate how an attacker would exploit them. If your provider only delivers a scan report or claims to offer “automated penetration testing,” you’re likely not getting a real pentest.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How do attackers move laterally in a network?&lt;/strong&gt;&lt;br&gt;
Lateral movement happens when an attacker uses one compromised account or system to access others. They often rely on local admin rights, cached credentials, or misconfigured permissions to hop from machine to machine, getting closer to high-value targets like domain controllers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What does a good pentest report include?&lt;/strong&gt;&lt;br&gt;
A strong report shows you exactly how far the tester got, what weaknesses were used, and what to fix first. It includes cracked credentials, privilege escalation paths, lateral movement risks, and prioritized remediation guidance.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>discuss</category>
      <category>security</category>
    </item>
    <item>
      <title>Penetration Testing Firms: 10 Red Flags Every Business Should Know</title>
      <dc:creator>Jason </dc:creator>
      <pubDate>Fri, 30 May 2025 20:32:54 +0000</pubDate>
      <link>https://dev.to/artificesec/penetration-testing-firms-10-red-flags-every-business-should-know-58om</link>
      <guid>https://dev.to/artificesec/penetration-testing-firms-10-red-flags-every-business-should-know-58om</guid>
      <description>&lt;h2&gt;
  
  
  Why You Shouldn’t Trust Penetration Testing Firms Without Asking These Questions
&lt;/h2&gt;

&lt;p&gt;When you pick a penetration testing firm, the biggest red flags are the ones that signal you are paying for theater instead of real validation. Be wary of any firm that won’t describe its testing methodology in plain language, refuses to define exactly what “penetration testing” includes, or can’t explain how it separates manual exploitation from automated scanning. Watch for vague scopes (“we’ll test everything”), pricing that looks too good to be true without a clear breakdown of time and effort, and proposals that focus on deliverables like “a big report” rather than outcomes like verified impact, reproducible evidence, and practical fixes. Credibility matters too: if a firm leans heavily on flashy claims instead of verifiable references, won’t name the actual testers assigned to your engagement, won’t commit to rules of engagement and safe-testing boundaries, or won’t offer a retest to confirm fixes, you should assume they won’t stand behind their work. Finally, treat any resistance to basic transparency as a deal-breaker: a legitimate firm will document scope, constraints, data-handling, and reporting expectations up front so there are no surprises for you or your auditors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why You Shouldn’t Trust Penetration Testing Firms Without Asking These Questions&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The penetration testing market has a quality problem. Some penetration testing firms run disciplined, expert-led engagements that use clear methodology, defined scope, and manual validation to prove real impact. Others sell a “pentest” that looks legitimate on paper but relies heavily on automated scanning, vague claims, and marketing language that does not match what gets delivered. If you can’t tell the difference up front, you can end up with a report that satisfies a checkbox while missing the attack paths that actually matter.&lt;/p&gt;

&lt;p&gt;This guide is built for buyers who want to vet penetration testing companies the same way they vet any other high-risk vendor. It focuses on practical due diligence, the questions that credible pen testing firms answer without hesitation, and the warning signs that often show up when a cybersecurity testing firm is more focused on appearance than outcomes. Nothing here requires you to assume bad intent. The point is to help you verify capability, ensure the scope matches your risk, and confirm the firm will stand behind the work with transparent reporting and retesting.&lt;/p&gt;

&lt;p&gt;By the end, you’ll know how to spot common red flags, what to ask before you sign a statement of work with a penetration testing provider, and how to avoid pentest vendors that overpromise, underdeliver, or blur the line between scanning and true manual testing. If you’re evaluating penetration testing firms right now, or reconsidering a past engagement, the goal is simple: make sure you’re buying real security testing, not a deliverable that only looks credible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What you’ll take away:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Why “best penetration testing company” marketing should trigger verification, not trust&lt;/li&gt;
&lt;li&gt;How to spot questionable credentials, unclear staffing, and unverifiable claims&lt;/li&gt;
&lt;li&gt;What to ask before you sign a pentesting services agreement&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #1: When Penetration Testing Firms Misrepresent Cybersecurity Certifications
&lt;/h2&gt;

&lt;p&gt;A common way some penetration testing firms try to look more qualified than they are is by listing impressive certifications and displaying certification logos without giving you a clean way to verify who actually holds them. Certifications can matter because they signal baseline training and hands-on skill, but the only thing that truly counts is whether the specific people testing your environment have the experience and credentials the vendor implies. If a penetration testing company makes broad claims like “our team is fully certified” while avoiding names, credential IDs, or verifiable proof, treat that as a serious warning sign.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The fix is simple:&lt;/strong&gt; verify. Before you sign with any penetration testing provider, ask for the names of the testers assigned to your engagement and request evidence for any certifications the vendor uses as a selling point. Legitimate pen testing firms will not act offended by basic due diligence. They will provide credential details you can confirm directly with the issuing body, and they will explain how those credentials map to the scope you are buying, whether that’s web application testing, internal network testing, cloud configuration review, or a blended assessment. If a cybersecurity testing firm stalls, changes its story, or pushes you to “trust the brand,” you should assume the marketing does not match delivery.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to protect yourself:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ask for the full names of the specific testers assigned to your engagement, not just roles or initials.&lt;/p&gt;

&lt;p&gt;Request proof of certifications the vendor highlights, including a credential ID or verification link where available.&lt;/p&gt;

&lt;p&gt;Verify directly with the issuing body, using official validation tools or support channels.&lt;/p&gt;

&lt;p&gt;Be skeptical of generic claims like “fully certified team” with no names or documentation.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ask for the full names of the specific testers assigned to your engagement, not just roles or initials.&lt;/li&gt;
&lt;li&gt;Request proof of certifications the vendor highlights, including a credential ID or verification link where available.&lt;/li&gt;
&lt;li&gt;Verify directly with the issuing body, using official validation tools or support channels.&lt;/li&gt;
&lt;li&gt;Be skeptical of generic claims like “fully certified team” with no names or documentation.&lt;/li&gt;
&lt;li&gt;Prefer penetration testing companies that provide a short tester bio, relevant project experience, and a clear mapping from tester capability to your scope.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Security companies don’t just drop logos on a page and hope you won’t notice. They give you names, resumes, and credentials that you can actually verify. If a vendor stalls or dodges when you ask, walk away.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Verification Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Offensive Security, certificate verification support and requests &lt;a href="https://help.offsec.com/hc/en-us/requests/new" rel="noopener noreferrer"&gt;https://help.offsec.com/hc/en-us/requests/new&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;(ISC)², “Member Verification” page (official way to verify an (ISC)² member) &lt;a href="https://www.isc2.org/MemberVerification" rel="noopener noreferrer"&gt;https://www.isc2.org/MemberVerification&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;GIAC, certification verification (GIAC Certified Professionals directory) &lt;a href="https://www.giac.org/certified-professionals/" rel="noopener noreferrer"&gt;https://www.giac.org/certified-professionals/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CompTIA, certification verification (CertMetrics login and verification workflows) &lt;a href="https://www.certmetrics.com/comptia/" rel="noopener noreferrer"&gt;https://www.certmetrics.com/comptia/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CREST, find a member company (for verifying CREST member organizations) &lt;a href="https://www.crest-approved.org/members/" rel="noopener noreferrer"&gt;https://www.crest-approved.org/members/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #2: When Pentesting Companies Hint at Government Ties Without Proof
&lt;/h2&gt;

&lt;p&gt;Some penetration testing firms try to boost credibility by implying they have government relationships or “agency-level” affiliations. You’ll see this when a vendor uses federal logos, name-drops government teams, or leans on vague language like “trusted by government” without giving you anything you can independently confirm. That kind of marketing is meant to shortcut your due diligence. In reality, legitimate federal work leaves a paper trail: the company can point to contract vehicles, award records, or other verifiable artifacts. If a penetration testing company won’t provide that level of clarity, treat the claim as unproven and evaluate them on what you can actually verify, such as tester qualifications, methodology, deliverables, and references you can contact.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to protect yourself:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ask for specifics: contract name, agency, time period, and whether the work was prime or subcontract.&lt;/li&gt;
&lt;li&gt;Verify claims using official government award databases rather than screenshots or logos.&lt;/li&gt;
&lt;li&gt;Be cautious with vague references to incident response teams or programs. Names get used loosely in marketing, and “CERT” can refer to an organization, not a certification.&lt;/li&gt;
&lt;li&gt;Prefer penetration testing providers who prove credibility through transparent scope, named testers, and reproducible technical evidence, not implied prestige.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reference and Verification Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;USAspending.gov, official open data source for federal spending and awards &lt;a href="https://www.usaspending.gov/" rel="noopener noreferrer"&gt;https://www.usaspending.gov/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;USAspending.gov, award search (find contracts and recipients) &lt;a href="https://www.usaspending.gov/search" rel="noopener noreferrer"&gt;https://www.usaspending.gov/search&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;System for Award Management (SAM.gov), official U.S. government site for entity registration and contractor records &lt;a href="https://sam.gov/" rel="noopener noreferrer"&gt;https://sam.gov/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;SAM.gov, entity registration and Unique Entity ID (UEI) getting started &lt;a href="https://sam.gov/entity-registration" rel="noopener noreferrer"&gt;https://sam.gov/entity-registration&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CISA alert, “US-CERT and ICS-CERT Transition to CISA” (explains status and consolidation of those brands) &lt;a href="https://www.cisa.gov/news-events/alerts/2023/02/24/us-cert-and-ics-cert-transition-cisa" rel="noopener noreferrer"&gt;https://www.cisa.gov/news-events/alerts/2023/02/24/us-cert-and-ics-cert-transition-cisa&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CISA, Industrial Control Systems topic page (how CISA frames ICS cybersecurity work and resources) &lt;a href="https://www.cisa.gov/topics/industrial-control-systems" rel="noopener noreferrer"&gt;https://www.cisa.gov/topics/industrial-control-systems&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #3: When Penetration Testing Firms Crown Themselves “#1”
&lt;/h2&gt;

&lt;p&gt;Be skeptical any time penetration testing firms claim they are “#1” based on a ranking they published themselves or on a list that has unclear ownership, unclear criteria, or paid placement. Self-published “Top 10 penetration testing companies” posts can look like independent research, but they are often just marketing content designed to shape perception and capture search traffic. That does not automatically mean the vendor is incompetent, but it does mean you should treat the claim as unverified until you can validate it through objective evidence.&lt;/p&gt;

&lt;p&gt;Instead of trusting rankings, evaluate penetration testing companies using signals you can check. Do they publish a clear methodology and rules of engagement? Will they name the testers assigned to your engagement and provide verifiable credentials? Can they provide references you can contact, and sample report sections that demonstrate real exploitation evidence rather than generic scanner output? Do they define scope and limitations precisely, and do they offer retesting to confirm fixes? The strongest penetration testing providers win work because they produce repeatable outcomes and clear documentation, not because they self-award trophies in blog posts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What to check before trusting any “best penetration testing company” claim:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Does the vendor rely on measurable proof of capability (methodology, staff, references, sample deliverables) rather than slogans?&lt;/li&gt;
&lt;li&gt;Who published the ranking, and is the publisher independent from the vendors listed?&lt;/li&gt;
&lt;li&gt;Are the evaluation criteria public, objective, and consistently applied?&lt;/li&gt;
&lt;li&gt;Is there evidence of real recognition, such as peer-reviewed awards, independent analyst reports, or reputable industry programs?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reference Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FTC, Endorsement Guides (rules and expectations around endorsements, testimonials, and disclosures) &lt;a href="https://www.ftc.gov/business-guidance/advertising-marketing/endorsements-influencers-reviews" rel="noopener noreferrer"&gt;https://www.ftc.gov/business-guidance/advertising-marketing/endorsements-influencers-reviews&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FTC, Guides Concerning the Use of Endorsements and Testimonials in Advertising (16 CFR Part 255) &lt;a href="https://www.ecfr.gov/current/title-16/chapter-I/subchapter-B/part-255" rel="noopener noreferrer"&gt;https://www.ecfr.gov/current/title-16/chapter-I/subchapter-B/part-255&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FTC, “Native Advertising: A Guide for Businesses” (disclosures when ads resemble editorial content) &lt;a href="https://www.ftc.gov/business-guidance/resources/native-advertising-guide-businesses" rel="noopener noreferrer"&gt;https://www.ftc.gov/business-guidance/resources/native-advertising-guide-businesses&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #4: When Penetration Testing Firms Misrepresent Team Size and Staffing
&lt;/h2&gt;

&lt;p&gt;Some penetration testing firms market themselves as having a large bench of “full-time senior experts” when the reality is much smaller or heavily contractor-based. A lean team is not a problem. Many excellent penetration testing companies stay small on purpose because it keeps quality high and accountability clear. The red flag is when a vendor’s headcount claims do not match who will actually perform the work, how they staff engagements, and what capacity they can realistically deliver within your timeline.&lt;/p&gt;

&lt;p&gt;This matters because staffing impacts outcomes. If a penetration testing provider oversells its team size, you may end up with testers you were not told about, last-minute subcontractors with unknown quality, or schedule pressure that pushes the engagement toward automated scanning instead of manual validation. The safest approach is to treat staffing as part of scope. You are not just buying a report. You are buying named expertise, time-on-target, and the ability to support remediation and retesting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here’s how to check:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ask who will perform the testing and who will write the report, including names and roles.&lt;/li&gt;
&lt;li&gt;Ask whether testers are employees or subcontractors, and whether any work will be outsourced.&lt;/li&gt;
&lt;li&gt;Request short bios or resumes for assigned testers and confirm relevant experience for your environment (cloud, web apps, internal network, AD, OT, etc.).&lt;/li&gt;
&lt;li&gt;Put staffing expectations in the statement of work (named testers or at least minimum qualifications, substitution rules, and notice requirements).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reference Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;NIST SP 800-115, Technical Guide to Information Security Testing and Assessment (planning, staffing, and conducting security testing) &lt;a href="https://csrc.nist.gov/pubs/sp/800/115/final" rel="noopener noreferrer"&gt;https://csrc.nist.gov/pubs/sp/800/115/final&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OWASP Web Security Testing Guide (WSTG), methodology benchmark for web application testing &lt;a href="https://owasp.org/www-project-web-security-testing-guide/" rel="noopener noreferrer"&gt;https://owasp.org/www-project-web-security-testing-guide/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CREST, professional standards and guidance for penetration testing (credentialing and quality signals) &lt;a href="https://www.crest-approved.org/" rel="noopener noreferrer"&gt;https://www.crest-approved.org/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #5: When Security Testing Companies Aren’t Transparent About Who Will Do the Work
&lt;/h2&gt;

&lt;p&gt;Some penetration testing firms present themselves as strictly “in-house” while staffing engagements with subcontractors or external testers that the client never approved or even knew were involved. Using contractors is not inherently bad. Many reputable penetration testing companies use them for niche expertise or to meet scheduling demands. The red flag is a lack of transparency. If a pentesting company markets “no outsourcing” or implies only employees will access your systems, but then assigns work to third parties without clear disclosure and controls, you should treat that as a serious governance and risk issue.&lt;/p&gt;

&lt;p&gt;This matters because staffing directly affects confidentiality, access control, and accountability. You are granting a security testing provider privileged visibility into your environment, sometimes including internal credentials, sensitive data, or production-like systems. You need to know who will access what, where they are located, and what contractual and technical safeguards apply. High-quality penetration testing firms handle this cleanly: they disclose whether testers are employees or subcontractors, restrict access to least privilege, document data-handling rules, and put the staffing and location constraints in writing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to protect yourself:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ask for the names and roles of the people who will access your systems and produce the report.&lt;/li&gt;
&lt;li&gt;Require disclosure of subcontractors and require written client approval before any third party participates.&lt;/li&gt;
&lt;li&gt;Confirm where testing will be performed (country/region) and whether any data will leave your environment.&lt;/li&gt;
&lt;li&gt;Ensure the statement of work covers confidentiality, access controls, and data handling, including retention and secure deletion.&lt;/li&gt;
&lt;li&gt;If your requirements include “U.S.-only personnel” or “no offshore access,” put it explicitly in the contract.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reference Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;NIST SP 800-171 Rev. 2, Protecting Controlled Unclassified Information (useful for contractor access expectations, access control, and system security requirements) &lt;a href="https://csrc.nist.gov/pubs/sp/800/171/r2/final" rel="noopener noreferrer"&gt;https://csrc.nist.gov/pubs/sp/800/171/r2/final&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;NIST SP 800-53 Rev. 5, Security and Privacy Controls (baseline controls relevant to third-party access, access control, and confidentiality) &lt;a href="https://csrc.nist.gov/pubs/sp/800/53/r5/final" rel="noopener noreferrer"&gt;https://csrc.nist.gov/pubs/sp/800/53/r5/final&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;NIST SP 800-115, Technical Guide to Information Security Testing and Assessment (planning and controls around security testing activities) &lt;a href="https://csrc.nist.gov/pubs/sp/800/115/final" rel="noopener noreferrer"&gt;https://csrc.nist.gov/pubs/sp/800/115/final&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #6: When Pentest Companies Fake Reviews
&lt;/h2&gt;

&lt;p&gt;Testimonials can help you shortlist penetration testing firms, but they are also easy to manipulate. The red flag is not “a vendor has reviews.” It’s when the reviews are vague, unattributed, or impossible to verify, especially when the vendor uses them as a primary credibility signal. In security testing, trust matters because you may be granting deep access to internal systems and sensitive data. If a penetration testing company relies on anonymous praise, generic quotes, or claims that do not connect to real, verifiable work, you should treat that as a cue to dig deeper before you engage.&lt;/p&gt;

&lt;p&gt;A credible penetration testing provider should be able to back up marketing claims with something concrete: a reference you can contact (under NDA if needed), a case study that explains scope and outcomes without hype, and a report style that demonstrates real testing rather than copy-paste language. You do not need public logos or flashy quotes to make a good hiring decision. You need evidence that the firm does the work they claim, documents it properly, and stands behind it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to spot questionable testimonials:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No full names, companies, or roles, and no way to verify the source.&lt;/li&gt;
&lt;li&gt;“Case studies” that read like ads instead of describing scope, constraints, and measurable outcomes.&lt;/li&gt;
&lt;li&gt;Quotes praising capabilities the vendor does not clearly offer elsewhere.&lt;/li&gt;
&lt;li&gt;Repeated generic phrasing with no attribution (“highly recommended,” “best in the business,” “excellent work”).&lt;/li&gt;
&lt;li&gt;Stock photos or generic headshots that appear unrelated to real clients.&lt;/li&gt;
&lt;li&gt;References the vendor refuses to enable even privately, such as a customer call under NDA.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reference Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FTC, Endorsement Guides overview (endorsements, influencers, and reviews) (&lt;a href="https://www.ftc.gov/business-guidance/advertising-marketing/endorsements-influencers-reviews" rel="noopener noreferrer"&gt;https://www.ftc.gov/business-guidance/advertising-marketing/endorsements-influencers-reviews&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;FTC, Guides Concerning the Use of Endorsements and Testimonials in Advertising (16 CFR Part 255) &lt;a href="https://www.ecfr.gov/current/title-16/chapter-I/subchapter-B/part-255" rel="noopener noreferrer"&gt;https://www.ecfr.gov/current/title-16/chapter-I/subchapter-B/part-255&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FTC, “Native Advertising: A Guide for Businesses” (when promotional content resembles independent editorial) &lt;a href="https://www.ftc.gov/business-guidance/resources/native-advertising-guide-businesses" rel="noopener noreferrer"&gt;https://www.ftc.gov/business-guidance/resources/native-advertising-guide-businesses&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #7: When Cyber Companies Fake Their Infrastructure
&lt;/h2&gt;

&lt;p&gt;Some cybersecurity vendors describe operational capabilities like a Security Operations Center (SOC), Network Operations Center (NOC), managed detection and response (MDR), or “data center” services in ways that imply a level of infrastructure and staffing they may not actually operate themselves. Sometimes those capabilities are real and in-house. Other times they are partner-delivered, limited in scope, or described with marketing language that blurs what you are truly buying. The red flag is not that a vendor relies on partners or runs lean operations. The red flag is when the vendor cannot clearly explain what exists, who runs it, what coverage looks like, and what evidence you will receive as a customer.&lt;/p&gt;

&lt;p&gt;If you are evaluating penetration testing firms, keep one thing straight: a strong penetration test does not require the vendor to run a SOC or a NOC. What matters is tester capability, a clear methodology, disciplined rules of engagement, safe execution, and reporting that proves real impact. When a vendor uses operational buzzwords to signal “enterprise readiness,” treat it like any other claim. Ask for definitions, boundaries, and proof, and put the parts you care about into the contract so they are deliverables rather than slogans.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to protect yourself:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ask for a plain-language definition of what they mean by “SOC,” “NOC,” “MDR,” and “data center” in their offering.&lt;/li&gt;
&lt;li&gt;If they claim 24/7 operations, ask how coverage works (shifts, escalation, staffing levels) and what reports, metrics, or SLAs you receive.&lt;/li&gt;
&lt;li&gt;Ask whether the capability is operated in-house or delivered through a partner, and require disclosure of any third parties involved.&lt;/li&gt;
&lt;li&gt;Verify the business address and request a high-level staffing summary for relevant roles (for example, SOC analysts, incident responders, NOC engineers).&lt;/li&gt;
&lt;li&gt;Put operational claims into the statement of work if they are part of your buying decision.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reference Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;NIST SP 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations &lt;a href="https://csrc.nist.gov/publications/detail/sp/800-137/final" rel="noopener noreferrer"&gt;https://csrc.nist.gov/publications/detail/sp/800-137/final&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;NIST SP 800-61 Rev. 2, Computer Security Incident Handling Guide (incident response operations that SOC teams commonly support) &lt;a href="https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final" rel="noopener noreferrer"&gt;https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CISA, National Cyber Incident Response Plan (coordination and operational response context) &lt;a href="https://www.cisa.gov/national-cyber-incident-response-plan-ncirp" rel="noopener noreferrer"&gt;https://www.cisa.gov/national-cyber-incident-response-plan-ncirp&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #8: When Penetration Testing Firms Blur Scanning and Real Pentests
&lt;/h2&gt;

&lt;p&gt;Vulnerability scanning plays a real role in a security program. It helps teams find known issues at scale and supports patch and configuration management. PTaaS can also be legitimate when it means human-led penetration testing delivered through a platform that improves scheduling, collaboration, evidence sharing, and retesting. The red flag is when penetration testing firms blur those terms and sell automated scanning as if it were a real penetration test. Scans and pentests can complement each other, but they are not interchangeable.&lt;/p&gt;

&lt;p&gt;A penetration test requires human judgment: validating findings, proving exploitability, demonstrating impact, and following realistic attack paths that scanners cannot reason about, like authentication abuse, authorization flaws, business logic issues, chaining, and lateral movement. When a vendor markets “automated penetration testing” or uses PTaaS language while avoiding any description of manual testing, assume you are looking at a scanning service unless they can prove otherwise. The goal is not to argue about labels. The goal is to ensure you know what you are buying and whether it matches your risk and compliance needs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to tell when you are being sold a scan rather than a pentest:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The report has no proof of exploitation: screenshots, request and response evidence, payloads, or clear reproduction steps.&lt;/li&gt;
&lt;li&gt;Findings are mostly generic CVE summaries and CVSS scores with little environment-specific context.&lt;/li&gt;
&lt;li&gt;There is no attack narrative: no chaining, no privilege escalation pathing, no lateral movement discussion where applicable.&lt;/li&gt;
&lt;li&gt;Web findings lack business logic testing, authorization testing, and application-specific abuse cases.&lt;/li&gt;
&lt;li&gt;The report reads like raw scanner output with branding rather than a tester-written assessment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;What to ask before you sign:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Will you retest high and critical fixes, and what does retesting include?&lt;/li&gt;
&lt;li&gt;How much time is allocated for manual testing versus scanning?&lt;/li&gt;
&lt;li&gt;What methodology do you follow, and what does “manual validation” mean in your process?&lt;/li&gt;
&lt;li&gt;What evidence will be included in the report to prove impact?&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Reference Links:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;NIST SP 800-115, Technical Guide to Information Security Testing and Assessment &lt;a href="https://csrc.nist.gov/pubs/sp/800/115/final" rel="noopener noreferrer"&gt;https://csrc.nist.gov/pubs/sp/800/115/final&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;OWASP Web Security Testing Guide (WSTG), methodology benchmark for web application security testing &lt;a href="https://owasp.org/www-project-web-security-testing-guide/" rel="noopener noreferrer"&gt;https://owasp.org/www-project-web-security-testing-guide/&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;PCI Security Standards Council, Penetration Testing Guidance (Information Supplement) &lt;a href="https://www.pcisecuritystandards.org/documents/Penetration-Testing-Guidance-v1_1.pdf" rel="noopener noreferrer"&gt;https://www.pcisecuritystandards.org/documents/Penetration-Testing-Guidance-v1_1.pdf&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #9: When a Penetration Testing Firm Uses Legal Threats Instead of Transparency
&lt;/h2&gt;

&lt;p&gt;Disputes happen in every industry. A professional penetration testing firm can have a disagreement with a former employee, a competitor, or a customer without it meaning anything about the quality of their work. The red flag is when a vendor responds to reasonable questions about scope, methodology, staffing, or deliverables with intimidation tactics, legal threats, or blanket demands for silence instead of straightforward answers. If a company’s first instinct is “lawyer up” rather than “show the evidence,” you should treat that as a governance risk, because it often correlates with poor transparency, weak documentation, and a culture that punishes scrutiny.&lt;/p&gt;

&lt;p&gt;This matters to you as the buyer because penetration testing firms may gain access to internal networks, credentials, vulnerability data, and sensitive reports. You want a vendor that behaves predictably under pressure, documents decisions, and resolves issues professionally. If the sales process includes aggressive NDAs before scoping, hostile reactions to basic due diligence, or refusal to provide verifiable proof of claims, it is a sign you should slow down and verify everything through neutral sources, then put your requirements in writing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to protect yourself:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Put key expectations in the statement of work: named roles, subcontractor disclosure, data handling, retention, and a clean retest process.&lt;/li&gt;
&lt;li&gt;Treat “trust us” responses as a signal to ask for documentation: methodology, sample sanitized report sections, staffing disclosure, and retest process.&lt;/li&gt;
&lt;li&gt;If you hear claims about government work, certifications, awards, or major clients, verify them through primary sources rather than marketing.&lt;/li&gt;
&lt;li&gt;Check public records for litigation and filings that may affect vendor stability or ownership, especially if the engagement requires long-term access or ongoing retesting.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reference Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;PACER, official federal court case search portal (“Find a Case”) &lt;a href="https://pacer.uscourts.gov/find-case" rel="noopener noreferrer"&gt;https://pacer.uscourts.gov/find-case&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;PACER Case Locator (nationwide index across federal district, bankruptcy, and appellate courts) &lt;a href="https://pcl.uscourts.gov/" rel="noopener noreferrer"&gt;https://pcl.uscourts.gov/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;U.S. Courts, “Find a Case (PACER)” explainer (what PACER is and what it covers) &lt;a href="https://www.uscourts.gov/court-records/find-a-case-pacer" rel="noopener noreferrer"&gt;https://www.uscourts.gov/court-records/find-a-case-pacer&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Colorado Judicial Branch, Docket Search (example of an official state judiciary docket search tool) &lt;a href="https://www.coloradojudicial.gov/dockets" rel="noopener noreferrer"&gt;https://www.coloradojudicial.gov/dockets&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Colorado Secretary of State, UCC Home (official UCC filing and search entry point) &lt;a href="https://www.sos.state.co.us/ucc/" rel="noopener noreferrer"&gt;https://www.sos.state.co.us/ucc/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Delaware Division of Corporations, UCC Search information (Delaware’s official guidance) &lt;a href="https://corp.delaware.gov/uccsearch/" rel="noopener noreferrer"&gt;https://corp.delaware.gov/uccsearch/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Red Flag #10: Using NDAs to Limit Normal Buyer Feedback and Accountability
&lt;/h2&gt;

&lt;p&gt;Non-disclosure agreements can be appropriate in security work. You may share network diagrams, credentials, vulnerability details, or incident information, and both sides need clear confidentiality rules. The red flag is when a security testing company uses an NDA (or contract language bundled with it) to go beyond protecting sensitive information and instead restrict normal, truthful feedback, dispute discussions, or professional review. Overbroad non-disparagement clauses, vague “reputation harm” language, or restrictions that chill even private escalation can make it harder for you to hold a vendor accountable if the engagement does not match what was promised.&lt;/p&gt;

&lt;p&gt;A healthy contract protects both sides and still leaves room for routine realities: you may need to share findings with auditors, regulators, counsel, insurers, or internal stakeholders; you may need to escalate a quality issue; and you may need to communicate factual concerns to get the work corrected. Strong penetration testing firms do not fear those guardrails. They define confidentiality clearly, specify what data they will collect and retain, outline dispute and remediation processes, and provide a retest path that resolves issues without intimidation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to protect yourself:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If something feels off, have counsel review it before you sign, especially if the vendor also asks for early payment or broad limitations on liability.&lt;/li&gt;
&lt;li&gt;Read confidentiality and “public statements” clauses carefully, including any non-disparagement language embedded in the SOW, MSA, or NDA.&lt;/li&gt;
&lt;li&gt;Ensure the agreement allows you to share necessary information with auditors, counsel, insurers, and regulators, and internally on a need-to-know basis.&lt;/li&gt;
&lt;li&gt;Require clear remediation and retesting terms: what happens if the deliverable is late, incomplete, or materially inconsistent with scope.&lt;/li&gt;
&lt;li&gt;Push back on vague “reputation harm” triggers or blanket restrictions that prevent factual communication.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reference Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cornell Law School Legal Information Institute, “Nondisclosure agreement” overview &lt;a href="https://www.law.cornell.edu/cfr/text/48/227.7103-7" rel="noopener noreferrer"&gt;https://www.law.cornell.edu/cfr/text/48/227.7103-7&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Cornell Law School Legal Information Institute, “Non-disparagement clause” overview &lt;a href="https://www.law.cornell.edu/wex/nondisparagement_clause" rel="noopener noreferrer"&gt;https://www.law.cornell.edu/wex/nondisparagement_clause&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FTC, Endorsement Guides (context for truthful reviews and disclosure expectations when endorsements are used in marketing) &lt;a href="https://www.ftc.gov/business-guidance/advertising-marketing/endorsements-influencers-reviews" rel="noopener noreferrer"&gt;https://www.ftc.gov/business-guidance/advertising-marketing/endorsements-influencers-reviews&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Thoughts: Choosing a Pentesting Company You Can Actually Trust
&lt;/h2&gt;

&lt;p&gt;Hiring penetration testing firms is not a normal vendor decision. You are giving an outside team deep visibility into your environment, and sometimes direct access to systems that support revenue, operations, and customer trust. That means your selection process should prioritize competence and transparency over marketing. The goal is simple: choose penetration testing companies that can prove what they do, explain how they do it, and document results in a way you can use for remediation, governance, and audits.&lt;/p&gt;

&lt;p&gt;If you are evaluating penetration testing providers, use a verification-first approach. Confirm credentials through the issuing body, validate who will actually perform the work, and insist on a clear methodology that distinguishes manual testing from automated scanning. Ask for a sample sanitized report section so you can see the level of evidence and context you will receive. Put key expectations in writing, including subcontractor disclosure, data handling, retesting, and timelines. Most importantly, pay attention to how the vendor responds to basic due diligence. Trustworthy pen testing firms welcome scrutiny because it matches how they work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A practical due diligence checklist:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Verify any highlighted certifications using the issuing organization’s official verification tools.&lt;/li&gt;
&lt;li&gt;Validate staffing and accountability, including who will test, who will write the report, and whether subcontractors will be involved.&lt;/li&gt;
&lt;li&gt;Review the scope and methodology in plain language, including how findings are validated and what evidence the report will include.&lt;/li&gt;
&lt;li&gt;Confirm data handling terms: what access is required, what data is retained, how it is protected, and when it is deleted.&lt;/li&gt;
&lt;li&gt;Ask about retesting and remediation support so you are not left with a report you cannot operationalize.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The best penetration testing firms do not rely on inflated claims or buzzwords. They set expectations clearly, execute safely, and produce evidence-driven reporting that helps you reduce risk. If you want a second set of eyes on a proposal or scope from a penetration testing vendor, reach out. We can help you sanity-check the engagement so you know you are buying real testing and not a deliverable that only looks convincing.&lt;/p&gt;

&lt;p&gt;Book a consultation to review your pentest scope, vendor proposal, or security testing plan.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://artificesecurity.com/contact" rel="noopener noreferrer"&gt;Click here&lt;/a&gt; to book a consultation!&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This article is educational and reflects general industry practices and publicly available information. It does not identify or accuse any specific company or individual. Examples are illustrative and are included to help buyers evaluate penetration testing firms using independent verification and documented due diligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Originally published at &lt;a href="https://artificesecurity.com/penetration-testing-firms-red-flags/" rel="noopener noreferrer"&gt;Artifice Security&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>discuss</category>
      <category>watercooler</category>
    </item>
  </channel>
</rss>
