{"id":48401,"date":"2023-10-31T09:29:43","date_gmt":"2023-10-31T08:29:43","guid":{"rendered":"https:\/\/cyberant.com\/?page_id=48401"},"modified":"2026-01-14T11:38:25","modified_gmt":"2026-01-14T10:38:25","slug":"network-pentest","status":"publish","type":"page","link":"https:\/\/cyberant.com\/en\/network-pentest\/","title":{"rendered":"Network Pentest"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1wwjstk-318d175d3cfd9953a9181c179d4ff8fa\">\n.avia-section.av-1wwjstk-318d175d3cfd9953a9181c179d4ff8fa{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2024\/08\/Netwerk-pentest-2024-01.jpg);\nbackground-position:50% 50%;\nbackground-attachment:fixed;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-1wwjstk-318d175d3cfd9953a9181c179d4ff8fa main_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-fixed av-minimum-height av-minimum-height-25 av-height-25  container_wrap sidebar_right'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48401'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-1ujaizs-67ce0da68dea724d773246b29f004808 sc-av_one_half av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1ujaizs-67ce0da68dea724d773246b29f004808\">\n.flex_column.av-1ujaizs-67ce0da68dea724d773246b29f004808{\npadding:40px 40px 40px 40px;\nbackground-color:#fcfcfc;\n}\n<\/style>\n<div  class='flex_column av-1ujaizs-67ce0da68dea724d773246b29f004808 av_one_half  avia-builder-el-1  el_before_av_one_half  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-top  '     ><section  class='av_textblock_section av-l9prgap3-2784efe24f9167578a0ba6d1f5eae14a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Network pentest<\/h2>\n<p>How many systems are in the corporate network? Often it is not known or some have been forgotten. Being sure that no system can be hacked is therefore often not possible.<br \/>\nSometimes it is as simple as the smart bulbs to your server network, hackers use what they come across. So it&#8217;s important to make sure that all devices on your network are secure. A network pentest is an effective tool to find and plug the holes in your network. We find these leaks with our own developed <a href=\"https:\/\/cyberant.com\/en\/vulnerability-management-netcaptain\/\">NetCaptain<\/a>. As experienced hackers, we have bundled our favorite tools into a super scanner. Servers, printers, websites and workstations, everything is thoroughly examined.<br \/>\nBut a scan alone is not a pentest. In addition to the results NetCaptain provides, our ethical hackers go to work identifying the risks that can really hurt your business. Want continued visibility into the security of your business network? With a NetCaptain license, you can continue to test the security of your server network every day.<\/p>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ey2pk-92f30f0cf68f5ddbc7971eed0914a181\">\n.flex_column.av-6ey2pk-92f30f0cf68f5ddbc7971eed0914a181{\npadding:40px 40px 40px 40px;\nbackground-color:#333333;\n}\n<\/style>\n<div  class='flex_column av-6ey2pk-92f30f0cf68f5ddbc7971eed0914a181 av_one_half  avia-builder-el-3  el_after_av_one_half  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lymzowap-f522d257685125a1740f7498fb86dbad\">\n#top .avia-animated-number.av-lymzowap-f522d257685125a1740f7498fb86dbad .avia-animated-number-title{\nfont-size:60px;\ncolor:#55bfa8;\n}\n#top .avia-animated-number.av-lymzowap-f522d257685125a1740f7498fb86dbad .avia-animated-number-content{\ncolor:#444444;\n}\n<\/style>\n<div  class=\"avia-animated-number av-lymzowap-f522d257685125a1740f7498fb86dbad av-force-default-color avia_animate_when_visible  avia-builder-el-4  el_before_av_hr  avia-builder-el-first  avia-color-font-custom \" data-timer=\"3000\"><strong class=\"heading avia-animated-number-title\"><span class=\"avia-single-number __av-single-number\" data-number_format=\".\" data-number=\"179\" data-start_from=\"0\">179<\/span><span class='avia-animated-number-icon av-icon-after-number av-icon-char' aria-hidden='true' data-av_icon='\ue8de' data-av_iconfont='entypo-fontello'><\/span><\/strong><div class=\"avia-animated-number-content\"><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lymzrskq-992775de5a461fb64e5f129a856defb7\">\n#top .hr.hr-invisible.av-lymzrskq-992775de5a461fb64e5f129a856defb7{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-lymzrskq-992775de5a461fb64e5f129a856defb7 hr-invisible  avia-builder-el-5  el_after_av_animated_numbers  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1yelbeg-e64900f8ae50a6d82cd24952d93c45e1\">\n#top .av_textblock_section.av-1yelbeg-e64900f8ae50a6d82cd24952d93c45e1 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-1yelbeg-e64900f8ae50a6d82cd24952d93c45e1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h2 style=\"text-align: center;\">Network pentests performed<\/h2>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lymzsicz-2beb3dc6b8d9b0b4a034ae45fbfea567\">\n#top .hr.hr-invisible.av-lymzsicz-2beb3dc6b8d9b0b4a034ae45fbfea567{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-lymzsicz-2beb3dc6b8d9b0b4a034ae45fbfea567 hr-invisible  avia-builder-el-7  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lymzt7rc-1c590cf35169ac46e49f32b720b9d870\">\n#top .av_textblock_section.av-lymzt7rc-1c590cf35169ac46e49f32b720b9d870 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lymzt7rc-1c590cf35169ac46e49f32b720b9d870 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p>\u2713 Three steps to assurance<\/p>\n<p>\u2713 Seeing what a hacker sees<\/p>\n<p>\u2713 In-depth investigation with a clear report<\/p>\n<p>\u2713 Conducted by our ethical hackers<\/p>\n<p>\u2713 Insight into network and IT infrastructure vulnerabilities<\/p>\n<p>\u2713 More than 10 years of experience<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kca1h2-a611770d7a1497b2680b21b08597c400\">\n#top .hr.hr-invisible.av-kca1h2-a611770d7a1497b2680b21b08597c400{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-kca1h2-a611770d7a1497b2680b21b08597c400 hr-invisible  avia-builder-el-9  el_after_av_textblock  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  class='avia-button-wrap av-lzl44f97-f4a095b896cde2e19218dde9ce72c4d7-wrap avia-button-left  avia-builder-el-10  el_after_av_hr  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzl44f97-f4a095b896cde2e19218dde9ce72c4d7\">\n#top #wrap_all .avia-button.av-lzl44f97-f4a095b896cde2e19218dde9ce72c4d7{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\nborder-style:none;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 0 0;\n}\n#top #wrap_all .avia-button.av-lzl44f97-f4a095b896cde2e19218dde9ce72c4d7:hover{\nbackground-color:#222222;\ncolor:white;\ntransition:all 0.4s ease-in-out;\n}\n<\/style>\n<a href='#network-contact'  class='avia-button av-lzl44f97-f4a095b896cde2e19218dde9ce72c4d7 av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Request a Network pentest\"><span class='avia_iconbox_title' >Request a Network pentest<\/span><span class='avia_button_icon avia_button_icon_right' aria-hidden='true' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello'><\/span><\/a><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/div><\/div><\/main><!-- close content main element --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3rfuf7a-ad53a66e6c12f3472dc9fb88f8cc742c\">\n.avia-section.av-3rfuf7a-ad53a66e6c12f3472dc9fb88f8cc742c{\nbackground-color:#ededed;\nbackground:linear-gradient( to bottom, #ededed, #ffffff );\nmargin-top:0px;\nmargin-bottom:14px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-3rfuf7a-ad53a66e6c12f3472dc9fb88f8cc742c main_color avia-section-default avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48401'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzsfs7mh-0631518dd6f2261175ed1a9afa2d6401\">\n#top .hr.hr-invisible.av-lzsfs7mh-0631518dd6f2261175ed1a9afa2d6401{\nheight:70px;\n}\n<\/style>\n<div  class='hr av-lzsfs7mh-0631518dd6f2261175ed1a9afa2d6401 hr-invisible  avia-builder-el-12  el_before_av_one_full  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div  class='flex_column av-3a00tsm-3fe76d98de781b148af420c0c4023feb av_one_full  avia-builder-el-13  el_after_av_hr  el_before_av_one_third  first flex_column_div  '     ><section  class='av_textblock_section av-lyn0ucng-c6873e5fb0e735465ce4871a2127da1c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 style=\"text-align: center;\">How does a network pentest work?<\/h1>\n<p style=\"text-align: center;\">Having CyberAnt perform a network pentest takes three steps.<\/p>\n<\/div><\/section><\/div><div  class='flex_column av-2wa3mc6-209b3f46fe85fcf75c988578a71c93af av_one_third  avia-builder-el-15  el_after_av_one_full  el_before_av_one_third  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-lyn12whb-53cad407caef24e9c5fc6faeae059530 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Step 1: Preparation<\/h3>\n<p>For a network pentest, NetCaptain is used as a base. After the official part of the agreement is taken care of, you will be given an installation file to install NetCaptain. When NetCaptain is running in the network then we schedule a session to do the configuration together. NetCaptain itself can find systems on the network, but it&#8217;s nice to know where to have NetCaptain look.<br \/>\nNetCaptain can find even more vulnerabilities when login credentials are present, e.g. we can also find who forgot to update their Google Chrome.<\/p>\n<\/div><\/section><\/div><div  class='flex_column av-2cimmfq-cc9ff539fd55c06ed3a471f2175799f3 av_one_third  avia-builder-el-17  el_after_av_one_third  el_before_av_one_third  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-lyn16x82-dea737d356f3605a48e8a22ee8bf4a72 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Step 2: Hacking and scanning<\/h3>\n<p>During configuration, we agree on when NetCaptain will scan. This can be during the day, but also at night or on weekends.<br \/>\nWhen all the scans have been performed, one of our ethical hackers goes off. NetCaptain detects almost all known vulnerabilities and makes them visible in a dashboard, categorized by threat level. In addition, some vulnerabilities cannot be found automatically, for this our cyber security experts go to work to manually detect everything. The data from the scan results are also interpreted by our experts and a map is made of where the pain points are within the network.<\/p>\n<\/div><\/section><\/div><div  class='flex_column av-28ds97a-8bb7cddd7dd92b8640700d87ff03e80a av_one_third  avia-builder-el-19  el_after_av_one_third  avia-builder-el-last  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-lyn1bj3u-4f5dcc1e4127a2d6c541322b4361a446 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Step 3: Report<\/h3>\n<p>When we finish turning the network inside out, we compile all the findings into a summary report. A description of the vulnerabilities is given with an estimate of the risk and impact. In addition, we also advise how best to fix a vulnerability.<br \/>\nEverything is substantiated with the evidence found for completeness. After delivering the report, we schedule a presentation of the report. Here we discuss the results and there is plenty of room to ask questions. This way we make sure that you are able to solve all found vulnerabilities.<\/p>\n<\/div><\/section><\/div>\n<\/p>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6bcbbq-343bcd552472611789d99937a703b563\">\n.avia-section.av-6bcbbq-343bcd552472611789d99937a703b563{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2024\/08\/Netwerk-pentest-contact-2024-02.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\nmargin-top:14px;\nmargin-bottom:14px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-6bcbbq-343bcd552472611789d99937a703b563 main_color avia-section-default avia-no-border-styling  avia-builder-el-21  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll av-minimum-height av-minimum-height-75 av-height-75  container_wrap sidebar_right'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='75' data-av_min_height_opt='75'><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48401'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-tudpo6-fe9c22b3044235eb8ed64d662554483a\">\n.flex_column.av-tudpo6-fe9c22b3044235eb8ed64d662554483a{\nborder-radius:10px 10px 10px 10px;\npadding:30px 30px 30px 30px;\nbackground-color:#ffffff;\n}\n<\/style>\n<div  class='flex_column av-tudpo6-fe9c22b3044235eb8ed64d662554483a av_three_fourth  avia-builder-el-22  avia-builder-el-no-sibling  first flex_column_div  '     ><section  id=\"network-contact\"  class='av_textblock_section av-lyo2wzch-ebba7e0cb7951ad4ecbac73539fdb404 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Learn more about the network pentest<\/h2>\n<p>Want to know if a network pentest suits your specific situation, or want an immediate quote?<br \/>\nLet us know, fill in your information and we will contact you.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lyn1qtm0-b091ae94dd89c566dc289907146d34d1\">\n#top .av_textblock_section.av-lyn1qtm0-b091ae94dd89c566dc289907146d34d1 .avia_textblock{\nfont-size:23px;\n}\n<\/style>\n<section  class='av_textblock_section av-lyn1qtm0-b091ae94dd89c566dc289907146d34d1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" >\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f50931-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"50931\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/48401#wpcf7-f50931-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"50931\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f50931-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_uacf7_hidden_conditional_fields\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"uacf7-form-wrapper-container uacf7-form-50931  \"><label> Name<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label> <label> Phone number <span class=\"wpcf7-form-control-wrap\" data-name=\"tel-855\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"tel-855\" \/><\/span> <\/label> <span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-455\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-455\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I agree to the terms and conditions set forth in the <a href=\"\/en\/privacy-statement\/\">Privacy Statement*<\/a><\/span><\/label><\/span><\/span><\/span>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Submit\" \/><\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\n<\/div><\/section><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-19s55cm-e73a0b7002d6cf95b897d67d0ae754f1\">\n.avia-section.av-19s55cm-e73a0b7002d6cf95b897d67d0ae754f1{\nmargin-top:20px;\nmargin-bottom:3px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-19s55cm-e73a0b7002d6cf95b897d67d0ae754f1 main_color avia-section-default avia-no-border-styling  avia-builder-el-25  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48401'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-jptzyu-afe1caa3d0d9766fabd3d7da23cc7dae sc-av_one_full av-equal-height-column-flextable'><div  class='flex_column av-jptzyu-afe1caa3d0d9766fabd3d7da23cc7dae av_one_full  avia-builder-el-26  avia-builder-el-no-sibling  first flex_column_table_cell av-equal-height-column av-align-middle  '     ><section  class='av_textblock_section av-lyo4jnyh-4398ee72223cd28e40e481f8dac0c757 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>What can you expect in a network pentest?<\/h2>\n<p>The team that performs the network pentest consists of a cybersecurity expert and an ethical hacker who purposefully look for security risks and then identify them. The network is thoroughly checked for weaknesses and leaks. In addition to the comprehensive scan with NetCaptain, the team is an important addition to ensure that all security risks are identified and addressed.<\/p>\n<p>The report that is delivered during a network pen test is structured in an orderly fashion. First, the management summary indicates how secure the network is, substantiated by the most important findings. The introduction contains all the general information and details of the investigation. In the findings section, all the findings that were made are made transparent by a brief explanation, followed by a table that includes the risk, impact and recommendation. Below are all the details of the evidence of the finding. Then all the recommendations associated with the findings are presented in a clear overview.<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<\/p>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lyo7cj49-d73f4a6f81b31d11eaf78783f3482d0e\">\n.avia-section.av-lyo7cj49-d73f4a6f81b31d11eaf78783f3482d0e{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2024\/08\/Netwerk-pentest-2024-02.jpg);\nbackground-position:0% 50%;\nbackground-attachment:scroll;\nmargin-top:3px;\nmargin-bottom:0px;\n}\n.avia-section.av-lyo7cj49-d73f4a6f81b31d11eaf78783f3482d0e .av-section-color-overlay{\nopacity:0.8;\nbackground-color:#333333;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-lyo7cj49-d73f4a6f81b31d11eaf78783f3482d0e main_color avia-section-default avia-no-border-styling  avia-builder-el-28  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap sidebar_right'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48401'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-4qnuja-d6676d73cab969416a2f26019c4a59f3 av_two_fifth  avia-builder-el-29  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzlcdgxa-5ec554475038a3bf6d664803e99f7dd4\">\n#top .av_textblock_section.av-lzlcdgxa-5ec554475038a3bf6d664803e99f7dd4 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lzlcdgxa-5ec554475038a3bf6d664803e99f7dd4 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h2>What we encounter in a network pentest<\/h2>\n<p>A corporate network often grows organically over the years. It makes sense that you don&#8217;t know exactly how every device is configured when you have hundreds of systems in your network. Certainly not if your colleagues and suppliers also connect new devices to the network at will or your former colleague forgot to document everything properly.<\/p>\n<p>Every network has its own peculiarities. Wondering what surprises can be found in your network? We would love to help you!<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lzabrxdq-614cd7cc36ae6f9d7867169a3adcce3b-wrap avia-button-left  avia-builder-el-31  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzabrxdq-614cd7cc36ae6f9d7867169a3adcce3b\">\n#top #wrap_all .avia-button.av-lzabrxdq-614cd7cc36ae6f9d7867169a3adcce3b{\nfont-size:18px;\nbackground-color:#37a68e;\nborder-color:#37a68e;\ntransition:all 0.4s ease-in-out;\nmargin:20px 0 20px 0;\n}\n#top #wrap_all .avia-button.av-lzabrxdq-614cd7cc36ae6f9d7867169a3adcce3b:hover{\ncolor:white;\ntransition:all 0.4s ease-in-out;\n}\n<\/style>\n<a href=''  class='avia-button av-lzabrxdq-614cd7cc36ae6f9d7867169a3adcce3b av-link-btn avia-icon_select-yes-right-icon avia-size-large avia-position-left avia-font-color-theme-color'   aria-label=\"Get in touch\"><span class='avia_iconbox_title' >Get in touch<\/span><span class='avia_button_icon avia_button_icon_right' aria-hidden='true' data-av_icon='\ue87d' data-av_iconfont='entypo-fontello'><\/span><span class='avia_button_background avia-button avia-color-theme-color-highlight' ><\/span><\/a><\/div><\/p><\/div><div  class='flex_column av-12hek3a-a005f371dc3ec6f53e89941a40e20c4d av_three_fifth  avia-builder-el-32  el_after_av_two_fifth  avia-builder-el-last  flex_column_div  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzlcyd10-26c413243e9f8eced79b856d3570dd30\">\n#top .av_textblock_section.av-lzlcyd10-26c413243e9f8eced79b856d3570dd30 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lzlcyd10-26c413243e9f8eced79b856d3570dd30 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h3>Example 1. Printers<\/h3>\n<p>During a network pen test, NetCaptain&#8217;s scan revealed that the printers were not password-protected. This made it fairly easy for us to watch live what was being printed and scanned. This could quite easily lead to company-sensitive information or a data breach, which would have quite an impact on the company. So something that is very easy and so arranged but not done can have major consequences just like that.<\/p>\n<h3>Example 2. Server on laptop<\/h3>\n<p>During a network pen test for a client, one of our cyber security specialists discovered that an employee had a server running on the laptop. This contained a serious leak that allowed us to access the laptop. From the access to the laptop it was also possible to access almost all the other servers of the company. These are one of the most dangerous leaks. We were still performing it from the company network, had this employee been sitting somewhere with the laptop externally in a public environment then an outsider could have easily managed to get that access as well. Fortunately, in this case it was detected in time and thus a possible cyber incident could be prevented.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2m9xme-779f2a5b1646623a270cfcb540178c8b\">\n.avia-section.av-2m9xme-779f2a5b1646623a270cfcb540178c8b{\nbackground-color:#ededed;\nbackground:linear-gradient( to bottom, #ededed, #ffffff );\n}\n<\/style>\n<div id='av_section_6'  class='avia-section av-2m9xme-779f2a5b1646623a270cfcb540178c8b main_color avia-section-default avia-no-border-styling  avia-builder-el-34  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48401'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzsgt1u7-aedbbc70e7c1c7b227eff63f5e44c06d\">\n#top .hr.hr-invisible.av-lzsgt1u7-aedbbc70e7c1c7b227eff63f5e44c06d{\nmargin-top:-7px;\nheight:1px;\n}\n<\/style>\n<div  class='hr av-lzsgt1u7-aedbbc70e7c1c7b227eff63f5e44c06d hr-invisible  avia-builder-el-35  el_before_av_one_full  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div class='flex_column_table av-jfqvq-8334f664a9b9676214311592b0e9f8ac sc-av_one_full av-equal-height-column-flextable'><div  class='flex_column av-jfqvq-8334f664a9b9676214311592b0e9f8ac av_one_full  avia-builder-el-36  el_after_av_hr  avia-builder-el-last  first flex_column_table_cell av-equal-height-column av-align-middle  '     ><section  class='av_textblock_section av-lzlcez6n-91c06bbdec35ddc5c7c740ccaac8547c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>What does a network pentest cost?<\/h2>\n<p>The cost of a network pentest depends on the size of the network. For example, for a company with about 500 targets (IP addresses \/ systems) the cost will be around 2,950 euros. For companies with more than 500 targets, a custom quote will be made, so this will vary by the size of the network. It is an investment that pays for itself by preventing security problems and protecting your business data, customer data and systems. Do you also want to keep hackers out of your network? Then make an appointment for a free intake interview with one of our cyber security experts.<\/p>\n<\/div><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_6'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-48401'><div class='entry-content-wrapper clearfix'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":48263,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-48401","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/48401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=48401"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/48401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media\/48263"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=48401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}