Internal Penetration Tests Stine Frederiksen March 28, 2023

Internal Penetration Tests

Secure your internal network and digital assets against today’s cyber threats

Key benefits

  • Identify vulnerabilities comprehensively
  • Effectively remediate risk
  • Improve security posture

Identify vulnerabilities and remediate risk

Our Internal Penetration Test is founded on our technical knowledge and is a thorough security test carried out from the perspective of an inside threat actor. The test aims to identify vulnerabilities in your internal network and – digital assets that can be exploited by malicious actors. Our offensive security experts will attempt to exploit the identified vulnerabilities to evaluate the actual risk they impose. Based on the test results the security posture of your internal network and – digital assets is evaluated.

What we do

Internal Penetration Testing starts with mapping the attack surface, which is done by mapping exposed services in terms of open ports, service types, technologies and versions, and by analysing network traffic. With the attack surface mapped, our team initiates the attack phase. During the attack phase, vulnerabilities are identified and exploited using automated and manual means. Alongside these techniques, we also use various network attacks such as spoofing, poisoning, and exploiting misconfigured network equipment, which enables us to launch MitM attacks to intercept and manipulate network traffic. These approaches assist us further in identifying and exploiting vulnerabilities within the infrastructure.

For Internal Penetration Tests the international standard NIST Special Publication 800-115 and Dubex’s extensive knowledge within offensive security forms a comprehensive testing program to ensure that the most critical security risks are addressed.

All findings from the penetration test are documented in a report and presented to you at a meeting, allowing you to ask questions as needed, to ensure you have a full understanding of the identified risks and how to remediate these

Hooded computer hacker hacking network. Male with black hoodie using computer for identity theft or other criminal online activity.


With our penetration test services, we deliver a comprehensive report detailing the penetration test and its findings and a report presentation where you will have the opportunity to ask questions to our offensive security experts about the findings. The report includes:

  • Executive summary with an evaluation of the security posture and strategic recommendations
  • Overview of the penetration test in terms of objective, scope, coverage, conditions, and methodology
  • Findings overview with information about positive security controls that were observed and a summary of the findings and recommended remediations
  • Technical description of each finding with severity, description, impact, replication steps and recommendations.

Contact us to learn more about how we can secure your business:

    Please phone me


    Christian Jul Jensen

    Chief Sales & Marketing Officer
    +45 3070 2557

    Lone D. Christensen

    Head of Offensive Security Services
    +45 3122 5648

    Why Dubex?

    Choosing the right offensive security partner is important when securing your organisation’s sensitive data and assets. At Dubex, we provide comprehensive and customised security tests to help enhance your organisation’s security posture.

    Our team of experts works closely with your organisation to improve your security posture by identifying and exploiting vulnerabilities, and by providing actionable remediations that enables you to improve your overall security posture.

    Choosing Dubex means partnering with a team of specialists dedicated to improving your security defences. We bring significant experience, having worked with numerous organisations across various industries. Our team of specialists stays up-to-date with the latest security threats and adversaries methods to provide you with the information needed to secure your organisation.

    Contact us today to learn how we can help secure your organisation’s sensitive data and assets.