Skip to main content
Attack Readiness

Know what attackers see
before they find your network.

A controlled attack simulation on everything reachable from the outside. Your external attack surface fully mapped and tested by certified ethical hackers.

What is an external pentest?

You know your systems are reachable from the outside. You have services exposed to the internet. You get a confirmed picture of what an attacker can actually do with them. An external pentest simulates the perspective of an attacker with no prior knowledge or internal access. You discover which systems are reachable, which vulnerabilities are exploitable, and which attack chains are open. You receive a report with concrete findings, exploitation evidence, and direct remediation steps.

About this service

External Pentest: the attacker's perspective as your foundation

Your external attack surface is what an attacker sees first. Every publicly reachable service, from your website to your VPN gateway, is a potential entry point. An external pentest simulates the perspective of an external attacker who has no prior knowledge or internal access and attempts to get in.

The team starts with OSINT: what information about your organisation is findable online? Subdomains, email addresses, technology choices, leaked credentials. Then all publicly reachable services are systematically tested for vulnerabilities. Not only known CVEs, but also misconfigurations, weak authentication, information leaks, and logic flaws.

What sets a DEFION external pentest apart is the focus on attack chains. An individual vulnerability may appear low risk, but combined with other findings the path to full compromise can open up. The team thinks like an attacker: not in isolated vulnerabilities, but in scenarios.

Why this matters

Three risks that undermine your external security

  • Attackers continuously scan your public systems

    Automated scanners run 24/7 and find your systems within minutes. One exploitable entry point can lead to full compromise of internal systems.

  • Shadow IT and forgotten systems expand your attack surface

    Forgotten test environments, misconfigured cloud services, and undocumented subdomains sit exposed without your knowledge. OSINT retrieves more than most IT teams expect.

  • Isolated vulnerabilities combine into attack chains

    A CVSS 5.0 vulnerability looks low risk in isolation. Combined with an information leak and weak authentication it becomes the gateway to your network. Automated scans do not see that combination.

What gets tested

Scope of the external pentest

Publicly reachable websites and web applications
VPN gateways and remote access solutions
DNS configuration and zone transfers
Public IP ranges and open ports
Externally reachable APIs
Remote management interfaces (RDP, SSH, admin panels)
Email infrastructure (SPF, DKIM, DMARC, open relay)
SSL/TLS configuration and certificate management
Cloud-related exposures (S3 buckets, Azure Blob Storage)
Methodology

How DEFION conducts an external pentest

01

Kick-off and scoping

Inventory of external assets, domains, and IP ranges. Rules, constraints, and planning are documented.

02

OSINT and reconnaissance

Passive and active information gathering. Subdomain enumeration, credential leaks, technology fingerprinting.

03

Threat analysis

Based on gathered information, likely attack vectors are identified for the target environment.

04

Exploitation

Active testing of CVEs, misconfigurations, weak credentials, brute-force attacks, web application flaws, and information leaks. Findings are chained into attack paths.

05

Post-exploitation

Determining what an attacker can reach after initial access. Lateral movement, privilege escalation, and data exfiltration are documented.

06

Reporting and debrief

Report with executive summary, technical details, CVSS scores, and remediation steps. Walkthrough with your team.

What you receive

Deliverables

  • Executive summary suitable for board and management
  • Technical report per vulnerability: description, evidence (screenshots, PoC), CVSS score, and remediation steps
  • Overview of the external attack surface
  • Report debrief (virtual or on-site)
  • Logs, screenshots, and tool output as attachments
  • Optional: retest after remediation
Target audience

Who is an external pentest for?

An external pentest is relevant for any organisation with publicly reachable systems. You face not only a technical risk but also a compliance obligation if you deliver digital services to customers or partners.

  • Organisations with customer-facing portals, webshops, or SaaS platforms
  • Companies that need to demonstrate ISO 27001, SOC 2, or NIS2 compliance
  • IT and security teams seeking independent validation of their external security posture
  • Organisations that recently migrated to the cloud or launched new services
  • Companies after a merger or acquisition where the external landscape changed
Frequently asked questions

FAQ

What is the difference between an external pentest and a vulnerability scan?
A vulnerability scan runs automated checks and reports known weaknesses based on version numbers. An external pentest goes further: the team actually exploits vulnerabilities, chains findings into attack paths, and tests for logic flaws and misconfigurations that scanners miss. The difference is between a checklist and a simulated attack.
How do you define the scope of an external pentest?
During kick-off we map all external assets together: domains, IP ranges, web applications, VPN gateways, and other publicly reachable services. Based on that we create a scope document with clear boundaries and agreed rules of engagement.
Can I exclude specific systems from the test?
Yes. During scoping we define exactly which systems are in and out of scope. If certain systems are too fragile or fall outside the test objective, we document that in the Rules of Engagement.
How quickly do I receive the report?
Typically within 5 business days after the test is completed. Critical findings are communicated immediately, so you do not have to wait for the final report.
How does an external pentest relate to red teaming?
An external pentest focuses on finding as many vulnerabilities as possible in your external attack surface. Red teaming simulates a full attack with a specific goal, such as reaching crown jewels, and includes social engineering and physical access. The external pentest is broader in coverage but narrower in attack techniques.

Ready to test your external attack surface?

Tell us what you want to test. We define the right scope together and start within days.