IT security

What type of pentest do I need?

A pentest must be carried out with the right objectives and the right scenarios if it is to be profitable.

The world is increasingly networked and no company can do without the Internet. This is why IT security affects every company without exception. However, every company is different and therefore has different requirements and prerequisites for its own IT security. Pentesting can be used to expose and eliminate security gaps in your own company. But what exactly is a pentest and which type of pentest is the right one?

Pentest definition

A pentest is a security test in which a so-called "pentester" attempts to penetrate a computer system or network, for example, in order to check its security and uncover any existing vulnerabilities. This test is often carried out by companies to ensure that their systems and networks are protected against external attacks. A pentest also uses various techniques and tools to check the security of the system for possible vulnerabilities and improve it if necessary.

What types of pentests are there?

The dimension must be clear in order to find the right one in the multitude of scenarios

The different types of pentests are classified as black box, white box or gray box. But how can this classification help in deciding on the right pentest?

Certain results are predetermined by the type of pentest selected. Depending on which scenario is chosen, the direction and result of the pentest is already limited. Other factors that limit the choice of pentest are the economic benefit (effort, costs) and the realism of the scenarios. The aim should be to optimize both.

Enter your headline here Black box scenarios

In these scenarios:

  • the pentesters have no insider knowledge or prior knowledge of the company

  • a situation is simulated in which unknown persons from outside attempt to penetrate the company's IT infrastructure

  • focus on obvious problems, but vulnerabilities can also be easily overlooked, such as the intern scenario (internal threats)

The icon for Pentest - Black Box

White box scenarios

In these scenarios:

  • the hackers have extensive knowledge of the company's IT infrastructure, are or may even have been part of the company (staff)

  • even more obscure vulnerabilities can be uncovered thanks to the full view of all systems

  • However, the result of the pentest and the prioritization of IT vulnerabilities often bears little relation to real threats and pentesters may increasingly lose their "neutral view" in the future as well

The icon for Pentest - White Box

Grey box scenarios

In these scenarios:

  • the pentesters have some insight and prior knowledge of the company

  • scenarios can be simulated in which, as is often the case in reality, no clear distinction can be drawn between internal and external threats

The icon for Pentest - Grey Box

In addition to the classification of pentests into white box, black box and grey box scenarios, there are other types and designations that we would like to discuss in the following section for the sake of completeness.

We are also happy to advise you personally if you have specific questions about penetration testing for your company

csm nicolas roesener e35f74755d
Nikolas Rösener
Security Expert

Types of pentests

External & internal penetration tests

An external pentest (also known as an external pentest) is a security test in which the pentester attempts to penetrate a company's network and systems from outside. The counterpart is the internal pentest, where the attack is simulated by an insider. Internal pentests are often used, for example, to penetrate an employee's email account (phishing attack).

A blind penetration test (also known as a closed-box penetration test) is a form of security test in which the testers have no information about the system or network to be tested. They begin the test without any prior knowledge and attempt to uncover possible vulnerabilities and security gaps. This type of pentest can be considered more realistic, as in real life it is possible that attackers have no information about the target and therefore have to sneak their way into the system.

A DoS (Denial of Service) test is a security test that attempts to overload a target system by bombarding it with a large number of requests. The purpose of this test is to check the stability and robustness of the system and to determine how it reacts to such a load.

A network pentest is a security test that uncovers potential vulnerabilities and security gaps in the network infrastructure. The entire internal infrastructure is assessed, checked for security risks and action measures are developed to close any security gaps identified. A network pentest is suitable for companies of all sizes, as nowadays almost all companies work with sensitive data and process or send it via the internal network, for example.

An application penetration test (sometimes referred to as an app pentest or simply an app test) is a type of security test that aims to uncover any vulnerabilities and security risks in an application(e.g. a computer program or mobile app).

These tests are carried out by experts who attempt to attack the system in the same way as a hacker would (also known as "ethical hacking"). The aim is to check the security of the application and ensure that it has no vulnerabilities that could be exploited by hackers. Unlike other types of penetration tests that focus on the entire network or system, an application penetration test specifically targets individual applications and attempts to identify and fix vulnerabilities in those applications.

Social engineering is a special form in which attackers attempt to obtain confidential information from people by persuading them to voluntarily grant them access to such information. This can be done in various ways, for example by the attackers posing as trustworthy persons (e.g. as employees of a company or as service providers) and thus persuading the victims to disclose confidential information such as passwords or access data. Attackers generally do not need any technical skills for social engineering. Instead, they use their skills in psychology and social influence to deceive victims and elicit confidential information from them.

This can also happen indirectly via phishing attacks, which is why phishing simulations are often used in penetration testing. Employees should also be regularly sensitized to such attacks through awareness training.

In addition to the aforementioned types of pentests, there are countless other classifications. These include cloud penetration testing, client penetration testing and red teaming. We would be happy to advise you individually on the sensible use of pentests for your company.

Targeted use of pentests

The formulation of a clear objective is a basic prerequisite for the success of the pentest and also makes sense from a time and economic perspective. You need to consider what you want to achieve with the pentest. The goal can range from "simply seeing the weak points" to "recognizing where the biggest business-relevant problems lie in the company". Is the priority the protection of sensitive data from third parties or protection against a business failure due to cyber attacks, or is the focus on fulfilling legal obligations or quality management?

In fact, it is often worthwhile not only deciding on a single scenario from the three categories, but also taking a look at the possibilities of the scenarios in the other two categories. For example, selecting a pure black box scenario carries the risk of not even uncovering internal sources of danger. In many companies, it is very obvious problems that reveal these scenarios. New interns or student trainees in the company often unintentionally or unknowingly gain access to all of the company's sensitive data. Another common danger is a lack of sensitivity on the part of employees when dealing with passwords. However, such scenarios are often not considered in black box pentests. A carefully selected scenario that covers a realistic middle ground between black box and white box can reveal both in this case. It therefore always makes sense to select both a black box pentest scenario and a social engineering pentest.

It is usually too time-consuming and often too cost-intensive to test a company's entire IT infrastructure and carry out all kinds of pentests. It is therefore helpful to check in advance which area is most vulnerable and where the greatest damage could be done to the company. Once you have carefully decided on a suitable pentest, ideally 20% of the testing effort can cover 80% of the security gaps according to the Pareto principle.

What is the difference between a pentest and a vulnerability analysis?

Penetration testing and vulnerability assessment are two different types of security testing, both designed to identify vulnerabilities in a system or, for example, a network environment. The main difference between the two approaches is that penetration testing actually attempts to access and exploit these vulnerabilities to determine whether they actually pose a security risk, whereas vulnerability assessments are limited to simply uncovering vulnerabilities.

Typically, penetration tests are performed by security professionals (called pentesters) who attempt to attack the system in the same way a hacker would, while vulnerability assessments are often performed by internal IT teams who regularly monitor the system and identify and fix vulnerabilities. In general, penetration tests provide a higher level of security as they actually actively try to exploit vulnerabilities and determine whether they pose a security risk.

Solutions require priorities, the pentest alone is not enough

Once the pentest has been carried out by the commissioned pentesters with the right objectives and scenarios, a list of weak points is produced. However, this list alone does not solve a single problem, nor does it provide any advice. In order to be able to respond effectively to vulnerabilities in the company's IT, these must first be prioritized, because of course not all problems can be resolved at once. To this end, the risks that are frequent and have a major impact should be prioritized (e.g. with the help of the Eisenhower matrix). A well-dimensioned pentest can provide most of this prioritization. The aim should be to fix the most realistic, most expensive and most damaging scenarios for the company first. It is therefore necessary to think about which areas of the company are vulnerable, which of these are particularly important and to become aware of the serious dangers and risks to which you are exposed. To do this, it is essential to know your own requirements.

However, the most important thing is to react to the results of the pentest and take action. If I remain passive after the pentest and do not change anything in the company to ensure greater IT security and close my own security gaps, then any pentest, no matter how comprehensive and cost-intensive, will be ineffective.

Your journey with OHB Digital Services

Use the knowledge from space travel for your business. OHB Digital Services GmbH has been a reliable partner for secure & innovative IT solutions for many years. We are part of one of the most successful space and technology companies in Europe. With our products and services, we support you in the digitalization of your business processes along the value chain and in all security-related issues. Please feel free to contact us.

Current magazine articles on the topic of IT security

social engineering
IT security
What actually is social engineering?
From a seemingly harmless text message to a sophisticated phishing campaign—how attackers exploit employees' weaknesses and trust to achieve their goals.
Read more
Red Teaming 32 1
IT security
What is Red Teaming and for whom is it useful?
In this article, we explain the advantages of red teaming and show you which companies this special form of pentesting is suitable for.
Read more
WEAKNESS ANALYSIS32
IT security
Why should vulnerability analysis also be an issue for SMEs?
More than half of all SMEs in Germany have already been victims of a cyberattack, with financial losses running into the millions depending on the extent of the attack.
Read more

Find out more about our pentests and awareness training courses.

Discover the possible applications for your company

csm nicolas roesener e35f74755d
Nikolas Rösener
Security Expert