Plan the next penetration tests now

With over 28 different work packages, we have a wide range of options for identifying security gaps in your company.

A report for every level of your management

Our trained experts carry out the test with the utmost care and prepare a report for both the technicians and the management.

Customization to your conditions and requirements

We adapt to your systems and carry out the tests according to your requirements. The scope is precisely defined in a prior kick-off meeting.

From the initial meeting to the implementation of the measures

We guide you through the entire process, from the initial meeting to defining the scope, testing and closing the security gaps.

We carry out penetration tests for companies of different sizes

From small and medium-sized companies to corporations, public administration and critical infrastructure organizations – we carry out penetration tests of all sizes. Up to date, in accordance with standards such as the OWASP Top 10 and based on ISO 27001.

Rely on the expertise of our pentesters, it’s that simple

Penetration test procedure

1. establishing contact & exchanging initial details
Once you have contacted us, we will schedule an initial meeting to discuss your request in more detail. We reserve the desired implementation period subject to reservation and determine the work packages and scope. You will then receive a quote.

2. offer acceptance and kick-off date
Your appointment is reserved as soon as you have accepted the offer. You will receive an order confirmation and all necessary contracts. All necessary information should be available for the kick-off meeting.

3. carrying out the test
We start carrying out the test on the agreed date, which is accompanied by an intensive exchange.

4. dispatch of the report and presentation of the results
We provide you with the report and, if required, we then hold a meeting to present the test results and recommended measures to your technicians and management.

Silas Borgmeier

Account Manager
Distribution

Would you like a personal consultation?

I will be happy to assist you with our expertise.

0209 8830 676 – 4

silas@aware7.de

Book an appointment

Our pentest work packages at a glance

Analysis of the external attack surface

External pentest

From the outside, we analyze your attack surface and examine the IP addresses provided or obtained

Web application

We test your web application. You can commission us before going live. Alternatively, you can provide us with a test instance.

Interfaces (API)

Do you provide interfaces for the exchange of information and data? We check these for availability, confidentiality and integrity.

Mobile app

Are you responsible for the operation of an Android, iOS or hybrid application? We check all common formats and implementations.

Password audit

We check the strength of the passwords used by your AD users with the help of simple and more complex password attacks.

Data leaks

The pentesters at AWARE7 receive a list of employees and compare it with data thefts. The list is tested against a variety of data leaks.

Darknet research

We search with keywords, data points and data sets that are circulating on the darknet and are used, among other things, for criminal activities.

Cloud auditing

This implementation is used to check the configurations of cloud environments for common misconfigurations.

Desktop application

If you provide customers with a desktop application, we check it for vulnerabilities that are dangerous for you and your customers.

Single sign-on

Our pentesters simulate a professional attack on an application with a single sign-on (SSO) implementation.

Analysis of the internal attack surface

Internal pentest

We analyze your attack surface from the inside. Experience the potential damage if an attacker has managed to penetrate your infrastructure

Evil Employee

A targeted investigation is carried out to determine what options are available to an employee who could cause an incident through gross negligence.

Stolen Notebook

Find out how great the potential for damage is if a laptop falls into the wrong hands.

WLAN audit

Do you provide wireless connection options? We investigate how securely these are designed.

Configuration audit

We check the implementation of your configuration against best practices, enabling you to determine the level of security.

Code review

The code you provide is evaluated with regard to the level of information and IT security.

Social engineering

AWARE7 analysts make targeted attempts to obtain information and access to rooms.

Physical pentest

The resilience of buildings and access restrictions is analyzed. Subsequently, a targeted attempt is made to penetrate sensitive areas.

Internal attack surface cloud

It examines how vulnerable the client’s cloud network is to attacks from internal services.

Find out more about our completed projects

Success stories

Group-wide awareness campaign for Gelsenwasser AG

Together with AWARE7 GmbH, Gelsenwasser AG carried out an extensive, multimedia cyber security awareness campaign for around 1,500 employees.

Download
Remote cybersecurity awareness event for Payback GmbH

PAYBACK GmbH has booked AWARE7 GmbH for a remote live hacking awareness show to prepare and sensitize employees to digital threats.

Download
Emergency deployment in the district of Dachau

At 9:00 am the speaker was canceled, we were called at 10:00 am. At 17:00 we were on time in Dachau to enrich the planned event with a live hacking presentation.

Download
Remote Live Hacking Show at the Security Days at Munich Re

The world’s largest reinsurer has been relying on our expertise for several years. In recent years, we have always been represented at the internal Security Days.

Download
External penetration test for the mobile iOS application of Twinsoft GmbH & Co. KG

We carried out an extensive penetration test of the BioShare Authenticator app and the backend for Twinsoft GmbH & Co.

Download
Take a look at all the success stories
and download them free of charge

We have been carrying out various types of projects. The satisfaction is reflected in the release of a success story. Take a look at all our success stories now.

All success stories

Callback service

Write to us with your request. We will be happy to call you back at a specific time.

Appointment service

Arrange a digital appointment with us so that we can discuss your requirements.

Contact form

Leave a message via our contact form. We will get back to you.

An excerpt from our pentesters

VincentReckendrees-Pentester-AWARE7GmbH

Vincent Reckendrees, MSc

Head of Offensive Security

Vincent Reckendrees has been working on the security of web applications for years. Among other things, he holds the OSWP certificate from OffSEc.

ThomasHenning-Referent-AWARE7GmbH

Thomas Henning, BSc

Offensive Security Consultant

Thomas Henning is a certified OSCP pentester. He uses his extensive expertise and analytical skills to uncover security vulnerabilities in IT systems.

TimBarsch-Pentester-AWARE7GmbH

Tim Barsch, BSc

Offensive Security Consultant

Analyzing internal networks and micro web services is part of Tim Barsch’s day-to-day business. He holds a bachelor’s degree in IT security.

Download the employee profiles of our qualified pentesters free of charge

To ensure quality, we at AWARE7 GmbH make sure that our penetration testers receive regular training and further education. These include industry-renowned certificates and examinations. Would you like to get an impression of the entire team? We are happy to provide you with this information.

IT security made in Germany

Attacking and testing applications is the means to an end. The medium-term goal is always to increase the level of IT security and thus enable the long-term protection of customer and company data. We have been awarded the “IT Security made in Germany” seal by the TeleTrust Bundesverband IT-Sicherheit e.V. (German IT Security Association). The document declaring and authorizing the use of the seal is available for inspection.

Even though we operate worldwide, our headquarters will remain in Germany

AWARE7 GmbH has been based in Germany since its foundation. The location in Germany is valued by our international customers due to the high quality standards.

Products and services are free of hidden accesses

All of the services we provide are carried out in accordance with ethical principles. The removal of all access points after a test is mandatory and firmly integrated into the process.

Research & development takes place exclusively in Germany

New products and collaboration with students and scientific institutes are part of our corporate DNA. We are always at the cutting edge of research and development and are based exclusively in Germany.

Plan your next penetration test now

Our methodology for carrying out penetration tests

FAQ – Frequently asked questions