Pen Testing: Uncover threats before attackers do
Request a free initial consultation with a pentest expert
Your benefits with PCG at a glance
Certified expert teams
Compliance focus (NIS2, ISO 27001)
Actionable remediation plans
Realistic attack simulations
Proactive security through penetration testing & red teaming
According to the BSI Situation Report 2024, the number of vulnerabilities in software products has reached a new high, and ransomware remains a central threat—especially for medium-sized companies. There are often only a few days or hours between the disclosure of new vulnerabilities (e.g., CVEs) and their exploitation by attackers.
Our security tests uncover these hidden risks before attackers can exploit them. This is how you effectively protect yourself against financial losses and reputational damage while simultaneously meeting important compliance requirements:
- Penetration tests: Focus on identifying as many technical vulnerabilities as possible in defined systems or applications. We assess their exploitability and the associated risk.
- Red teaming: Simulates targeted, in-depth attacks (similar to Advanced Persistent Threats - APTs) on your entire organization. This tests your overall defense capabilities—technology, processes, and the response of your employees and security systems (Blue Team / SOC).
Which security test suits your needs
A concise matrix helps you find your way:
| Test type | Suitable for | What is primarily assessed? |
|---|---|---|
|
Web-App-Penetration test |
SaaS companies, online shops, portals, companies with web applications |
OWASP Top 10, API authentication/authorization, business logic flaws, configuration |
|
Network penetration test (external/internal) |
All companies with their own IT infrastructure |
Firewalls, VPNs, servers, endpoints, segmentation, open ports, misconfigurations |
|
Cloud-Penetration test (AWS, Azure, GCP) |
Companies with cloud workloads |
IAM configuration, storage security, container security, serverless functions |
|
Mobile app penetration test |
Companies with their own mobile applications (iOS/Android) |
Insecure data storage, transmission vulnerabilities, coding errors, API integration |
|
Red Teaming Assessment |
KRITIS, banks, more mature organizations with their own SOC/Blue Team |
Overall defense capability (technology, processes, people) against targeted attacks |
AI & LLM Penetration Testing: Secure your AI applications
AI applications and large language models (LLMs) bring new, unique risks. A chatbot can disclose sensitive data, cause unexpected costs or serve as a gateway. Our AI pentest service identifies these specific vulnerabilities so that you can use AI safely.
Our approach: Focus on OWASP Top 10 for LLMs
We simulate attacks on your AI models to find critical vulnerabilities beyond classic pen testing. This is based on the OWASP Top 10 for LLM Applications (2025) standard.
We check, among other things
Prompt Injection & System Prompt Leakage
Supply chain risks & data/model poisoning
Sensitive information disclosure & improper output handling
Vector and Embedding Weaknesses
Excessive Agency & Unbounded Consumption
Misinformation
Our approach: Methodical, thorough, and tailored
We test a wide range of targets, including networks, web applications, cloud environments (AWS, Azure, GCP), mobile apps, APIs, and IoT systems. Our testing approaches (black-box, grey-box, white-box) are tailored to your specific needs and desired level of information. An important component is also OSINT analysis (Open Source Intelligence) for reconnaissance.
5 steps to greater security
- Preparation & scoping: Joint definition of your goals (e.g., NIS2 resilience test), the test scope, legal framework (NDA), and the rules of engagement.
- Information gathering & analysis: OSINT analyses and controlled, active scans to identify your systems, potential attack vectors, and initial vulnerabilities.
- Manual verification & exploitation: Our certified experts attempt to manually and controlledly exploit the identified vulnerabilities to assess their real risk and eliminate false positives.
- Documentation & reporting: Creation of a detailed report including a management summary, technical analysis (including CVSS scores, CWE references, proof-of-concept for exploits), and clear, prioritized recommendations for action.
- Results presentation & action planning: Joint review of the results and support in planning the next steps for remediation.
Why a follow-up penetration test after remediation is crucial
PCG expertise – uncovering what others overlook
Here’s how our OSCP experts document a critical SQL injection:
A SQL injection (SQLi) is one of the most common and dangerous vulnerabilities in web applications. Our experts follow a methodical approach to identify and document it:

