Pentest or Penetration Test.

What is a Pentest? 

A Pentest or Penetration Test is an authorised security assessment to identify and exploit vulnerabilities in your organisation’s information processing systems. Our ethical hackers will try to gain access to these systems by using their knowledge & experience to penetrate your defenses. After the test, CRANIUM will document the techniques & vulnerabilities used in a comprehensive report & presentation with suggested solutions and a roadmap for improvement.

“A CRANIUM Pentest gives you a good insight into the vulnerabilities of the systems and applications in your organisation.”

– Davy Pinxten
Principal Security Consultant

The 6 Steps of Pentesting. 

A CRANIUM Pentest consists of 6 steps. Depending on the size of the organisation, this entire process will take on average 3 to 5 work days. Of course, not every company is the same, and because of this, our expert consultants adapt the process to your organisation’s size and needs.


Steps of Pentesting

1. Reconnaissance

Discovery phase to gather as much information as possible about the organisation and its available IT systems.

2. Enumeration

Comprehensive assessment to identify misconfigured systems, outdated software and other vulnerabilities.

3. Analysis & Determination

Analysis of the gathered information to determine the vulnerabilities that are present in the organisation’s assets.

4. Exploitation

Based on the gathered information, our ethical hackers will try to work their way into your systems.

5. Post-Exploitation

Our ethical hackers move around in the network to go even further and get more privileges and rights in the network.

6. Report & Recommendation

Crucial phase that covers all previous phases in a detailed report, presented by our pentest experts.

The last phase brings all findings together in a complete and concise report. Our CRANIUM consultant delivers a detailed description of all found vulnerabilities and their potential impact on the organisation. The report also includes appropriate remedial actions and proof of concept where possible. Using the recommendations, the report makes it possible for the IT-department and (Chief) Information Security Officer to immediately start working on fixing the vulnerabilities found.

Need more info or want a quote

Do you have any questions, would you like to receive a personal quote or want to request a free consultation with one of our experts to discuss your needs?
Reach out through the form below or give us a call: +32 2 310 39 63.


Related Solutions.

Is your organisation’s Information Security Maturity level low? Do not fret.  We also provide support in setting up phishing campaigns, performing a baseline measurement on your information security and compiling an overview of your risks. When deciding which information is worth (extra) protecting, we can assist in creating a data strategy.

Last year 1 out of 8 Flemish organisations fell victim to cybercrime. Don’t become a statistic! Stay one step ahead of hackers and download our Cybersecurity Ebook.*

*CRANIUM is committed to protecting and respecting your privacy. We will only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick above to confirm we may contact you. You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy ( By clicking submit above, you consent to allow CRANIUM to store and process the personal information submitted above to provide you the requested communication.