(866) 340-1312

(937) 346-8490

PEN Testing

Is Your Organization Secure?

No system is secure until it is tested for vulnerabilities

PEN Testing: Actively trying to breach an organization’s network with the intent to provide feedback on its vulnerabilities

What Is PEN Testing?

No system is secure until it is tested for vulnerabilities. And that’s exactly what ProStratus does. Commonly called PEN Testing or Penetration Testing, this approach is an active attempt to breach an organization’s network with the intent to provide feedback on the vulnerabilities that were exploited and to develop a plan of action to “plug the holes.”

Once requested, penetration tests are usually done without warning to give the organization no time to prepare employees. This is the best way to simulate an actual attack and gauge the effectiveness of both users and security controls.

Pentation Testing Your Networks

Are there different types of penetration tests?

There are different types of tests that represent different methods to compromise your organization.

These testing methods are:

Social Engineering

Social Engineering

This simulates common attempts to penetrate your organization by getting human beings to give away the “keys to the kingdom.”

This usually includes phishing emails, pretexting (asking seemingly innocuous questions over the phone to gain information to use later) and otherwise manipulating employees into doing something that would compromise business integrity.



These types of penetration attempts test the physical security measures of office buildings or other organizational structures.

A test might include attempting to access secure areas by presenting falsified credentials or by sneaking in through unlocked doors.

Once inside, testers might take notes of passwords written on sticky notes, or place observation devices, such as webcams, to garner further information.

These tests are less technical but are just as important for assessing the security resilience of an organization.



This test targets wireless access to corporate data. The goal is to test configurations and access levels, as well as encryption protocols.

This battery of tests will also attempt to test the mobile devices of users, whether they connect to a secure corporate network or a guest network. This test seeks to reveal weaknesses in wireless structure and configuration by mimicking a threat actor simply being in range of the organizational wireless signal.

Web Based Apps

Web Based Applications

Most external attacks focus on web applications, as they are so commonly used by organizations. Whether it be on the server side or the client side, the vulnerabilities of many web applications are known factors and can easily be exploited by threat actors with the right tools.

Web applications offer a great threat to organizations as there are a variety of approaches that can be taken to compromise data. These include, but are not limited to, cross-scripting, poor encryption, and SQL injections.

Network Infrastructure

Network Infrastructure

This is probably the most well-known penetration test, as it is commonly what people assume when they hear the word “hack.”

With a network infrastructure penetration test, there are a variety of approaches. This could include attempts at evading intrusion detection or compromising the anti-virus systems. It could also be initiated from within the network in order to test traffic monitoring protocols or end point protection of workstations.

These types of tests could also focus on network devices, like routers and smart switches, to determine if they are configured correctly or have known vulnerabilities that are exploitable.

Why would I want a PEN test?

  1. The best way to determine the functional level of security within an organization is to have someone else hack it.
    With a penetration test, the results end up being action items instead of a ransomware attack. ProStratus will help secure your network by doing our best to penetrate it, and then present you with our findings so that we can use that information together to build a more secure environment by fixing the vulnerabilities that were exposed.

  2. No one is completely honest when they are assessing themselves. So having an unbiased partner do the testing will reveal a much more realistic picture about the actual state of cybersecurity within an organization.

Get The FAQs

Is Outsourcing IT right for you?

ProStratus will help you carefully evaluate if outsourcing your IT is the right business decision. Sometimes it is a no-brainer, other times it’s a toss-up. Contact Us today to Schedule your Free Consultation. You will speak with a technical expert, not a sales rep. Our Services Sell Themselves.

We are in the business of transforming companies – we can’t wait to help you transform yours!

What Is MSP For Small Business

For small businesses the MSP is their primary support provider and may be augmented by an office manager or other technical staff member. Larger enterprises might supplement their existing IT staff for specific services, like cloud computing or managed security. Managed Services Providers can provide solutions at a lower cost and or provide technical expertise that may be lacking with their existing staff.


We are a dedicated team of technology professionals

IT Engineering

With 60+ years of combined IT Engineering experience ProStratus will play the key role in designing and implementing your most technically challenging projects

IT Security

Keeping Appliances, Staff and Clients up to date and aware of the latest trends in threats and protection is part of the ProStratus IT Security umbrella

IT For Business

Matching businesses with the right technology is a ProStratus Key Strength. We're committed to finding the right solutions for your IT goals