Narok logo
← All services
Pentest · P_01_PENTEST

Penetration testing: what an attacker would actually do.

The goal is not to produce a list of theoretical vulnerabilities — it's to show what a real attacker could do, how far they could go, and what it would actually cost.

Perimeters

Four main perimeters

Apps & APIs
01

Web

Injections, authentication bypass, session theft, sensitive-data exposure. Manual approach, OWASP-based.

  • OWASP Top 10
  • Authenticated multi-role testing
  • API fuzzing · GraphQL
  • Business logic
Insider threat
02

Infrastructure / internal network

Simulating an attacker with a foothold. Attack paths, privilege escalations, misconfigurations.

  • Access control · NAC
  • Lateral movement
  • Privilege escalation
  • Data exfiltration
iOS · Android
03

Mobile

Analysis of the application, its API communications, and on-device behaviour. Based on OWASP Mobile.

  • Reverse · decompilation
  • Local storage
  • API communication
  • SSL-pin bypass
Identity
04

Active Directory

Audit of AD configuration, identification of attack paths to top privileges, exploitation of bad authentication and delegation practices.

  • Kerberoasting · ASREP
  • Constrained delegation
  • ACL abuses
  • Tier 0 · Domain Admin
Method

Five steps

0130 minutes

Scoping

Technical workshop: scope, scenarios, constraints, exploitation window, emergency contacts.

021 hour

Kickoff

Presentation of methodology, tools, team. Final validation of scope and requirements.

035 to 20 days

Execution

Recon, vulnerability identification, exploitation, post-exploitation. Daily updates.

041 hour

Debrief

Detailed technical report + prioritised remediation plan. Presentation to technical teams and decision-makers.

051 to 3 days

Re-test (optional)

Validation of applied fixes, finding updates, remediation attestation.

Deliverable

A readable report. A prioritised action plan.

Our report is built to be used: by technical teams to fix, by decision-makers to prioritise.

  • Executive summary
  • Reproducible findings, CVSS severity
  • Prioritised remediation plan
  • Detailed technical appendices
  • Presentation to teams
  • Rapport · client.fr
    Pentest web — synthèse
    NK-2026-014
    CRIT
    1
    HIGH
    1
    MED
    2
    LOW
    1
    Findings · top 5
    CRITIDOR/api/accounts/:id
    HIGHSQL injection/search?q=
    MEDWeak cookie flagssession_id
    MEDVerbose error/api/v1/users
    LOWX-Frame-Options*
    Fictional extract · illustrative data
    Si vis pacem, para bellum.

    Ensure peace.
    Prepare for war.

    A partner replies within 48 hours for an initial technical exchange.

    Request an audit