Skip to content
VULNERABILITY ASSESSMENT

Comprehensive Vulnerability Assessment

Systematicallyidentify,classify,andprioritizevulnerabilitiesacrossyourentireattacksurface.

Overview

What Is a Vulnerability Assessment Service?

A vulnerability assessment is a systematic security review that identifies and enumerates known vulnerabilities across your internal network, internet-facing systems, cloud environments, and applications. It combines non-exploitative unauthenticated scans (external attacker perspective) with authenticated, credentialed checks (trusted-user perspective) to produce a complete, prioritized view of your security exposure — without actively exploiting identified vulnerabilities. This makes it the right choice when minimizing business disruption is critical while still gaining deep visibility into your security gaps.

Why Do You Need a Vulnerability Assessment?

Modern attackers combine information from internet-facing systems with any foothold they can gain inside the network. A vulnerability assessment mirrors that dual perspective — external and internal, unauthenticated and authenticated — to reveal patch gaps, misconfigurations, and exposed services before they are chained together into a breach. It is also the fastest way to produce the evidence required by auditors for PCI DSS, ISO 27001, GDPR, and NIS2 compliance, with prioritized remediation guidance your team can act on the same week.

Authenticated & unauthenticated checks
Manually validated, CVSS-scored findings
Production-safe, non-disruptive approach
Aligned to PCI DSS, ISO 27001, GDPR, NIS2
Coverage

What We Assess

A Penteor vulnerability assessment covers your entire attack surface — from internet-facing systems including internal endpoints, cloud resources, and applications — using the right combination of unauthenticated and authenticated checks for each asset class.

External perimeter — firewalls, VPN gateways, email servers, DNS, web applications
Internal network — servers, workstations, domain controllers, file shares
Operating systems — Windows, Linux, macOS patching and hardening gaps
Network devices — routers, switches, firewalls, wireless access points
Cloud environments — AWS, Azure, GCP misconfigurations and exposed services
Web applications & APIs — outdated libraries, known CVEs, weak configurations
Database servers — weak credentials, unpatched database engines, and access control flaws
Authenticated hardening review — CIS Benchmark alignment, service permissions
Scope Options

Types of Vulnerability Assessment

A vulnerability assessment is defined by two independent choices: where we test from (external, internal, or both) and whether we log in (unauthenticated or authenticated). Together they describe the attacker perspective being simulated and the depth of visibility you get.

From the internet

External Vulnerability Assessment

Runs against your internet-facing perimeter — firewalls, VPN gateways, mail, DNS, and public web applications. Unauthenticated by default, it mirrors exactly what an attacker on the open internet can enumerate and target.

Scope: public IPs, domains, hosted applications
Perspective: unauthenticated external attacker
Common finding: exposed services, missing TLS, CVEs
Required by PCI DSS quarterly external scanning
Inside your network

Internal Vulnerability Assessment

Runs from inside the network — servers, workstations, Active Directory, cloud VPCs. Can be performed remotely via the Penteor Testing Appliance, and split into two modes depending on whether we use credentials.

Unauthenticated (no credentials)

Simulates a breached attacker already on the LAN. Reveals exposed services, default credentials, protocol weaknesses, and CVEs on open ports.

Authenticated (with credentials)

Logs in with service credentials you provide to inspect each host from inside — missing patches, weak permissions, outdated software, hardening gaps. Finds far more real issues.

Internal scans — both unauthenticated and authenticated — can be delivered remotely. We deploy the Penteor Testing Appliance in your network (hardware or VM) and run the full assessment through a secure, encrypted tunnel — no travel required.

Remote Testing

Remote Internal Scans with the Penteor Testing Appliance

Internal vulnerability assessments — especially authenticated ones — need direct network reachability to every target. Rather than travel on-site, we deploy the Penteor Testing Appliance (PTA) directly inside your internal network. Available as a pre-configured hardware box or as a virtual machine image, the PTA establishes a secure, encrypted tunnel to our scanning infrastructure, enabling authenticated and unauthenticated scanning across your internal environment with the same depth and quality as on-site testing — and without the cost or scheduling overhead of travel.

Your Network

Internal assets, servers, workstations, cloud VPCs, databases

Penteor Testing Appliance

Hardware or virtual machine · Plug-and-play · Encrypted tunnel

Penteor Scanning Team

Certified analysts run the full assessment remotely

01/07

Available as pre-configured hardware or as a virtual machine (OVA/OVF, Hyper-V, KVM)

02/07

Plug-and-play setup — connect it to your network, no complex installation

03/07

Secure encrypted tunnel to our scanning infrastructure

04/07

Runs both unauthenticated and authenticated scans locally

05/07

Full internal network reach equivalent to on-site scanning

06/07

Reduces travel costs and scheduling complexity

07/07

Hardware returned or VM & device securely wiped after engagement

Methodology

Vulnerability Assessment Methodology

Our methodology combines external unauthenticated scanning (what an external attacker can see), internal unauthenticated scanning (what an attacker sees after gaining access to the LAN), and authenticated credentialed checks (what a trusted insider or compromised administrator could discover). Each finding is manually validated, CVSS scored, and prioritized by exploit availability and asset criticality.

Scoping & asset inventory

We define in-scope systems, networks, and applications, agree whether internal, external, or both are covered, and confirm if authenticated (credentialed) checks are included. A signed scoping document defines the boundaries, testing windows, and emergency contacts before any activity starts.

Our Services
Process

Testing Lifecycle

Every vulnerability assessment follows the same repeatable lifecycle — from initial scoping through discovery, unauthenticated and authenticated scanning, manual validation of each finding, and a CVSS-scored report with prioritized remediation guidance.

01Scoping & Asset Inventory
02Discovery & Enumeration
03Unauthenticated Scanning
04Authenticated Scanning
05Validation & Reporting
06Remediation & Retesting
FAQ

Frequently Asked Questions

Ready to Start Your Vulnerability Assessment?

Contact us to discuss your security testing needs.

Request a Quote