Ellipse 15
blur circle
Ellipse 15
blur circle

Penetration Testing
(Ethical Hacking)

Penetration Testing Services for Web, API, Mobile and Cloud
Integra is a leading cybersecurity partner providing comprehensive penetration testing and ethical hacking services for companies across Europe.
Our certified experts (OSCP, eWPT, CEH) simulate real-world attacks to identify vulnerabilities in your applications, networks and cloud environments — helping you meet NIS2, ISO 27001 and DORA compliance requirements.
Request a free scoping call or download a sample pentest report to see how our approach works in practice.

Integra | Profesionální penetrační testy.

What we test (scope)

The list of penetration tests we perform is quite extensive — below you’ll find an overview divided into three main categories.

111

Applications & API

  • Web Applications – testing application logic, authentication, access control, and vulnerabilities according to OWASP.
  • Mobile Applications – security testing of iOS/Android clients and their backend services, including data protection on the device.
  • API Tests – assessing the security and authorization of REST/GraphQL APIs.
  • SAST – static analysis of source code.
  • DAST – dynamic analysis of running applications.

222

Infrastructure & Cloud

  • External Test – assessment from the Internet perspective.
  • Internal Test – simulation of an attacker inside the network.
  • Network Infrastructure Tests – firewalls, VLANs, routing.
  • Cloud Environments – AWS, Azure, GCP.
  • Containers and DevOps – CI/CD, Kubernetes.
  • Wi-Fi Networks – wireless communication security.
  • OSINT – publicly available information about the organization.

SOCIALNI INZENYRSTVI 1

Social Engineering

  • Social Engineering – phishing, vishing, baiting.
  • Red Team / Adversary Simulation – comprehensive scenarios imitating real attackers (combination of various attack types).
  • Physical Security – on-site access tests and inspection of entry points.

In addition to the services listed above, we run advanced attack scenarios such as Wi-Fi (rogue AP), Active Directory attacks (Kerberos / NTLM), workstation tests (privilege escalation), hardware / OT analysis, and stress / DoS tests to validate system resilience.

 

Why choose Integra as your penetration testing partner?

Individual approach to every test

We don’t run generic scans – each scenario is tailored to your environment, risks and expectations. Every test has a clear objective, measurable benefits, and practical value.

Certified ethical hackers

Our team consists of experts holding certifications such as OSCP, eWPT, CEH, and CISSP. We ensure the quality of deliverables through internal peer review and proven methodologies like OWASP and OSSTMM.

Hundreds of projects and 14 years of trust

For over 14 years, we have been helping organizations protect their data. With more than 240 projects delivered annually, we are among Europe’s leading providers of ethical hacking services.

Free consultation

Take advantage of a no-obligation consultation where we will assess your needs and propose the most suitable penetration testing solution.

Modern tools and proven methods

We use advanced tools and well-established methodologies to ensure maximum accuracy, quality, and reliability of results.

Certificate of testing

Upon completion of a penetration test, you will receive an official certificate that can be used for internal audits or as evidence for your clients and partners.

Trusted by
SIEMENS WHITE
Untitled
WULTRA WHITE
air
CESKA SPORITELNA WHITE 1
HOMECREDIT WHITE

How penetration testing works

Penetration testing is carried out as a structured project with clearly defined phases, timeline, and deliverables. We work in close collaboration with your team, ensuring a smooth process, efficiency, and tangible improvements to the security of your environment.

1

Initial meeting & scope definition

Together we clarify the test objectives – whether to focus on applications, infrastructure, or social engineering. We agree on the test type (black/grey/white box), timeline, scope, and points of contact.

✅ Deliverable: approved scope, schedule, and contacts

2

Project kick-off & preparation

We handle all formalities: sign NDAs, finalize technical details, exchange required accesses (e.g., test accounts, VPN), and set up communication channels and expectations.

✅ Deliverable: prepared environment, working access, secure communication

3

Test execution

Our ethical hacker conducts the test according to the agreed scenario. They combine manual and automated techniques, use tools common in real-world attacks, and verify the exploitability of vulnerabilities.

✅ Deliverable: ongoing communication of critical findings

4

Reporting & consultation

We deliver a clear report including technical details, risk levels, and remediation recommendations. A follow-up consultation helps interpret the results and guide the next steps.

✅ Deliverable: final vulnerability report, list of recommended fixes

5

Retest (optional)

After the fixes are implemented, we verify whether the vulnerabilities have been properly resolved. The retest is quick and focused, and includes an updated report.

✅ Deliverable: confirmation of risk mitigation / updated status

How much does penetration testing cost?

The price of a penetration test typically ranges between €4,000 and €12,000, depending on the scope and complexity of the project.

For example, testing a medium-sized infrastructure of about 700–1000 assets usually requires approximately 15 man-days of expert work.

What factors influence the price of penetration testing?

Scope of testing

The scope depends on the number and complexity of assets being tested (IP addresses, applications, databases, devices, APIs, etc.). If you have a limited budget, testing can be focused on selected parts of the system, or a maximum number of man-days can be defined.

Testing methodology

The price also depends on the depth of testing. For example, a test based on the OWASP Top 10 covers only the most common vulnerabilities, while a full OWASP methodology is significantly more extensive.

Testing location

Most tests can be performed remotely. However, for more complex environments, on-site presence of a specialist may be required.

Additional services

Costs may increase if you require assistance with remediation or a retest after vulnerabilities have been fixed.

blur circle
Ellipse 15

Frequently Asked Questions (FAQ)

What is a penetration test?

A penetration test (or “pentest”) is a controlled security assessment where ethical hackers simulate real-world cyberattacks to identify vulnerabilities before they can be exploited by malicious actors.

How long does a typical penetration test take?

A standard web or API penetration test usually takes 8–10 business days to complete. This includes both the active testing phase and report preparation. Larger or more complex environments may require additional time, but our delivery schedule is always transparent and predictable.

When can you start and when will the test be completed?

Our average scheduling window is 4–6 weeks in advance, depending on tester availability and project scope. Once testing begins, we typically complete the full cycle (testing + reporting) within two weeks. We are flexible and can prioritize urgent requests or compliance deadlines if needed.

How many testers do you have and what can you test?

Integra currently employs arround dozen certified penetration testers covering all major testing domains: web and desktop applications, APIs, mobile apps, cloud and infrastructure, Active Directory, OSINT, OT/ICS, and social engineering (phishing & vishing).

Which standards and methodologies do you follow?

Our testing follows leading industry frameworks such as OWASP, MITRE ATT&CK, and PTES. We map results to compliance frameworks including ISO 27001, PCI DSS, and NIST SP 800-115. Our team holds certifications like OSCP, CEH, ECSA, eWPT, CISA, OSWP, and CRTO, ensuring top technical and ethical standards.

What does the final penetration test report look like?

Each report includes a management summary written in clear, business-friendly language and a technical section detailing every finding — ranked from most critical to least, with impact analysis, screenshots, and remediation guidance. You can preview an anonymized sample report here.

How is a penetration test different from a vulnerability scan?

A vulnerability scan is automated and detects known issues. A penetration test combines automation with manual exploitation to verify real impact, uncover chained or business-logic flaws, and confirm how far an attacker could go.

How often should penetration testing be performed?

Most organizations perform penetration testing annually or after major system or code changes. High-risk environments such as banks, SaaS, and healthcare often test quarterly or continuously as part of ongoing security programs.

How much does a penetration test cost?

Pricing depends on scope, complexity, and type of system. Typical web application tests range from €4,000 – €10,000, while larger infrastructure or red team engagements can exceed €20,000. We provide transparent quotes and fixed-price options for defined scopes.

Will penetration testing disrupt production systems?

No. Tests are performed under controlled and approved conditions. We coordinate testing windows, apply non-intrusive techniques, and maintain real-time communication to prevent downtime. You always have full visibility into the process.

Do you work with international clients?

Yes — Integra delivers penetration testing globally. We serve clients across Europe, the US, and LATAM, providing reports in English and aligning our work with international compliance and data protection standards.

Can you sign an NDA before the project starts?

Absolutely. We sign NDAs before any information exchange, and handle all data and project artifacts securely during and after the engagement.

What industries do you typically serve?

We work with clients across banking, fintech, healthcare, manufacturing, retail, and public administration. Our testing methodology adapts to each environment while maintaining a consistent technical depth and quality.

What tools and techniques do you use?

We combine manual exploitation with both commercial and open-source tools such as Burp Suite Pro, OWASP ZAP, Nmap, Nessus, Metasploit, BloodHound, Postman, and MobSF. Our testers also create custom scripts to automate tasks and ensure realistic, evidence-based results — never relying on automated scans alone.

What is the difference between OWASP and OWASP Top 10?

OWASP (Open Web Application Security Project) is an international community that develops open standards, methodologies, and tools to improve application security. It includes frameworks such as the OWASP Testing Guide, ASVS, and SAMM, which define how secure software should be designed and tested. The OWASP Top 10, on the other hand, is just one of OWASP’s projects — a regularly updated list of the ten most common and critical web application vulnerabilities based on real-world data from thousands of tests worldwide.
Contact Us

WE ARE HACKERS ON YOUR SIDE

Get in touch — we’re happy to help with penetration testing and improving your company’s security.

 

Integra TEAM

Request for sample report of test results

Žadost o vzorovou zprávu výsledků z testu