How We Work
Our Testing Methodology
A structured, repeatable process that ensures no attack vector is overlooked — from initial scoping to final re-test verification.
Reconnaissance
Information gathering & attack surface mapping
We begin with passive and active reconnaissance — mapping domains, subdomains, technologies, open-source intelligence (OSINT), leaked credentials, and cloud assets connected to your environment. Nothing that should be hidden is left unexamined.
Threat Modelling
Prioritising attack vectors based on your risk profile
Using the reconnaissance data, we build a threat model specific to your application and business context. We identify the highest-value targets, most likely attacker motivations, and the attack paths that would have the greatest impact if exploited.
Active Testing
Manual and automated vulnerability testing
This is where the core engagement takes place. Our testers combine automated tooling with deep manual testing, probing every identified attack surface for vulnerabilities — authentication flaws, injection points, broken authorisation, logic errors, and beyond.
Exploitation
Safe proof-of-concept exploitation to prove real impact
We safely exploit confirmed vulnerabilities to demonstrate their real-world impact. This goes beyond a theoretical finding — we prove severity with documented evidence and chain vulnerabilities where possible to show escalation paths, all without causing disruption.
Analysis & Reporting
Comprehensive report with clear remediation guidance
Every finding is documented with severity rating (CVSS), a clear description, reproduction steps, evidence, business impact, and actionable remediation. We produce both an executive summary for leadership and a technical report for your engineering team.
Remediation & Re-test
Verification that every vulnerability is fully fixed
After your team implements fixes, we re-test every identified vulnerability to confirm complete remediation and check that no new issues were introduced as a side-effect. A clean re-test report is provided for compliance and client assurance purposes.
Aligned Standards
Tested against industry standards
Our methodology is aligned to the OWASP Testing Guide, PTES (Penetration Testing Execution Standard), and OWASP WSTG to ensure comprehensive, consistent coverage on every engagement.