Skip to main content
Home / Services / Network Penetration Testing

Network Penetration Testing

Internal and external network security assessments that find what scanners miss

1-3 weeks Starting at $8,000
Network Pentest Results 18 FINDINGS
SCAN 10.0.0.0/24 - 847 hosts discovered
VULN 10.0.1.15:445 - EternalBlue (MS17-010) CRIT
CRED LLMNR poisoning - NTLMv2 hash captured HIGH
RELAY SMB relay to 10.0.2.30 - admin access CRIT
ENUM SNMP community string: public MED
InternalExternalSegmentationWireless
Overview

What This Engagement Covers

A comprehensive assessment tailored to your environment.

Our network penetration testing covers both internal and external attack surfaces. We simulate real-world attacks against your network infrastructure to identify misconfigurations, weak credentials, vulnerable services, and lateral movement paths that could let an attacker compromise your environment.

Our Process

What We Test & How

What We Test

We assess your full network stack including firewalls, routers, switches, VPNs, DNS, mail servers, Active Directory, segmentation controls, and all exposed services. External testing targets your internet-facing perimeter. Internal testing simulates an attacker who has gained initial access to your corporate network and attempts to escalate privileges and move laterally.

Our Approach

We start with reconnaissance and port scanning to map your attack surface, then move into service enumeration, vulnerability identification, and manual exploitation. For internal assessments, we perform credential attacks, LLMNR/NBT-NS poisoning, Kerberoasting, relay attacks, and privilege escalation. Every finding is validated with proof-of-concept and mapped to real business impact.

Deliverables

What You'll Receive

Everything included in your engagement report.

External perimeter assessment report

Internal network assessment report

Network topology and attack path diagrams

Credential exposure and password policy analysis

Lateral movement and privilege escalation findings

Segmentation bypass documentation

Prioritized remediation plan with quick wins

Post-remediation retest validation

Methodology

Our Testing Methodology

A structured approach to identifying and validating vulnerabilities.

1

Host discovery and port scanning

2

Service enumeration and version fingerprinting

3

Vulnerability identification and validation

4

Credential attacks and password spraying

5

Network protocol exploitation (LLMNR, SMB, SNMP)

6

Privilege escalation and lateral movement

7

Segmentation and VLAN bypass testing

8

Post-exploitation and data access validation

Findings

Common Vulnerabilities We Find

Typical security issues discovered during this type of engagement.

Weak or Default Credentials LLMNR/NBT-NS Poisoning Vulnerabilities SMB Signing Disabled Unpatched Services and Software Insufficient Network Segmentation Exposed Management Interfaces Cleartext Protocol Usage (FTP, Telnet, HTTP) Misconfigured Firewall Rules
Who It's For

Ideal For

Enterprise IT Environments
Organizations with On-Premise Infrastructure
Companies Preparing for Compliance Audits
Businesses After a Merger or Acquisition
Healthcare and Financial Services
Any Organization with Internal Networks
Compliance

Standards We Support

PCI-DSS SOC 2 HIPAA ISO 27001 NIST 800-53 CMMC GLBA

Ready to Get Started?

$8,000

Typical engagement: 1-3 weeks

Why Us

Why Lorikeet Security

Certified Experts

OSCP, OSCE, CEH, GPEN certified professionals

Auditor Ready

Reports designed for compliance audits

Free Retesting

Validate fixes at no additional cost

Expert Support

Direct access to testing team during remediation

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!