← Back to services // Offensive

Penetration Testing

CCV certified - blackbox, greybox & whitebox

€175 /hour CCV certified

Our CCV certified pentesters perform thorough security tests on your applications, networks and infrastructure. We identify vulnerabilities before malicious actors do. Available in blackbox, greybox and whitebox variants.

What is a penetration test?

A penetration test - pentest for short - is a controlled attack on your IT environment. We break in, document how, and show you what a real attacker could have done. Not a theoretical risk matrix, but proven attack paths with proof-of-concept.

The difference with a vulnerability scan? A scanner runs Nessus or Qualys, delivers a PDF with CVEs and calls it done. We go further. Our pentesters combine tools like Burp Suite, BloodHound and Nuclei with manual investigation and years of offensive experience. We find the business-logic flaws, chained exploits and configuration issues that scanners structurally miss.

Zolder is a CCV Keurmerk Pentesten certified penetration testing company. This certification guarantees competence, independence and reporting quality. For organisations subject to NIS2 or ISO 27001, this is often a requirement.

Types of penetration tests

We offer three variants:

  • Blackbox: we know nothing upfront and work as an external attacker.
  • Greybox: we receive limited information - an account, some architecture docs - and simulate an insider threat.
  • Whitebox: full access to source code and configuration. The most thorough, and our recommendation if you want maximum value.
Which type fits, we discuss during the scoping call. You sit directly with the pentester who will perform the test - not with an account manager.

Why should you get a penetration test?

Dutch organisations are actively targeted. Ransomware in manufacturing, credential-stuffing against SaaS platforms, supply chain attacks via vendors - we see it daily in our work. A pentest gives you:

  • Proven attack paths: not theoretical lists, but concrete exploits with screenshots and commands.
  • Compliance: NIS2, BIO, ISO 27001 and PCI-DSS require periodic pentests.
  • Trust: more and more clients and partners demand pentest reports in tenders.
  • Honest picture: we do not inflate findings to justify the engagement. If something is secure, the report says so.

Our approach

Short lines, direct action. That is how we work.

  • Scoping & threat modelling - you speak directly with the pentester. Together we determine scope, objectives and rules of engagement. What are your crown jewels?
  • Reconnaissance - OSINT, port scanning, service fingerprinting, subdomain enumeration.
  • Vulnerability analysis & exploitation - systematic testing, followed by controlled exploitation. We demonstrate real impact.
  • Post-exploitation - lateral movement, privilege escalation, persistence. How far can an attacker get?
  • Reporting - clear report with management summary, technical details including reproduction steps, and concrete recommendations. No consultancy jargon.
  • Retest - after your fixes we can verify whether vulnerabilities have actually been resolved.
During the test we share critical findings with you immediately - not three weeks later in a report. You get a Slack channel or Signal group with the researcher. That is what we mean by short lines.

What does a penetration test cost?

Our hourly rate is €175 per hour (excl. VAT). Total costs depend on scope, test type and complexity:

  • Scope: a web application versus a full infrastructure with hundreds of hosts.
  • Test type: blackbox requires more reconnaissance hours than whitebox.
  • Complexity: custom applications, proprietary protocols or legacy systems take more time.
  • Compliance requirements: OWASP ASVS or PTES may require additional test cases.
An average web application pentest amounts to €5,000 - €15,000. Infrastructure tests are higher. We always provide a fixed quote after a free scoping call - no surprises afterwards.

Methodology

1

Scoping

Bepalen van de scope, doelstellingen en regels van de test.

2

Reconnaissance

Actief en passief verzamelen van informatie over het doelsysteem.

3

Exploitatie

Actief testen en exploiteren van kwetsbaarheden.

4

Rapportage

Gedetailleerd rapport met bevindingen en aanbevelingen per prioriteit.

5

Hertest

Verificatie dat gevonden kwetsbaarheden succesvol zijn opgelost.

Frequently asked questions

How long does a penetration test take?

A web application pentest takes 1-3 weeks turnaround. An infrastructure test 2-4 weeks. Actual testing hours fall within that range. We always schedule in consultation to minimise disruption. During the test you can contact the pentester directly with any questions.

What is the difference between a vulnerability scan and a pentest?

A vulnerability scan is automated and reports known CVEs. A pentest goes much further: we actually exploit vulnerabilities, chain weaknesses into attack paths and manually test for business-logic flaws. We find what Nessus and Qualys miss.

What standards does Zolder follow for pentests?

We are CCV Keurmerk Pentesten certified and work according to PTES, OWASP Testing Guide and OWASP ASVS. Depending on your industry, we can also perform PCI-DSS or BIO-specific test cases. Which standard fits best, we discuss during the scoping call.

Can a pentest disrupt my systems?

We work in a controlled manner and in consultation. High-risk tests are only performed after explicit consent. In practice, our pentests rarely cause disruption. If something does go wrong, the pentester is directly reachable - no ticket system, just a phone call.

How often should you have a penetration test performed?

At least annually, and after significant changes to your application or infrastructure. Many compliance frameworks (ISO 27001, NIS2, PCI-DSS) require periodic tests. After the pentest we discuss what makes sense for your situation - we do not recommend testing more often than necessary.

Ready to test your security?

Get in touch with our team for a no-obligation conversation about your security challenges.