Penetration Testing
CCV certified - blackbox, greybox & whitebox
Our CCV certified pentesters perform thorough security tests on your applications, networks and infrastructure. We identify vulnerabilities before malicious actors do. Available in blackbox, greybox and whitebox variants.
What is a penetration test?
A penetration test - pentest for short - is a controlled attack on your IT environment. We break in, document how, and show you what a real attacker could have done. Not a theoretical risk matrix, but proven attack paths with proof-of-concept.
The difference with a vulnerability scan? A scanner runs Nessus or Qualys, delivers a PDF with CVEs and calls it done. We go further. Our pentesters combine tools like Burp Suite, BloodHound and Nuclei with manual investigation and years of offensive experience. We find the business-logic flaws, chained exploits and configuration issues that scanners structurally miss.
Zolder is a CCV Keurmerk Pentesten certified penetration testing company. This certification guarantees competence, independence and reporting quality. For organisations subject to NIS2 or ISO 27001, this is often a requirement.
Types of penetration tests
We offer three variants:
- Blackbox: we know nothing upfront and work as an external attacker.
- Greybox: we receive limited information - an account, some architecture docs - and simulate an insider threat.
- Whitebox: full access to source code and configuration. The most thorough, and our recommendation if you want maximum value.
Why should you get a penetration test?
Dutch organisations are actively targeted. Ransomware in manufacturing, credential-stuffing against SaaS platforms, supply chain attacks via vendors - we see it daily in our work. A pentest gives you:
- Proven attack paths: not theoretical lists, but concrete exploits with screenshots and commands.
- Compliance: NIS2, BIO, ISO 27001 and PCI-DSS require periodic pentests.
- Trust: more and more clients and partners demand pentest reports in tenders.
- Honest picture: we do not inflate findings to justify the engagement. If something is secure, the report says so.
Our approach
Short lines, direct action. That is how we work.
- Scoping & threat modelling - you speak directly with the pentester. Together we determine scope, objectives and rules of engagement. What are your crown jewels?
- Reconnaissance - OSINT, port scanning, service fingerprinting, subdomain enumeration.
- Vulnerability analysis & exploitation - systematic testing, followed by controlled exploitation. We demonstrate real impact.
- Post-exploitation - lateral movement, privilege escalation, persistence. How far can an attacker get?
- Reporting - clear report with management summary, technical details including reproduction steps, and concrete recommendations. No consultancy jargon.
- Retest - after your fixes we can verify whether vulnerabilities have actually been resolved.
What does a penetration test cost?
Our hourly rate is €175 per hour (excl. VAT). Total costs depend on scope, test type and complexity:
- Scope: a web application versus a full infrastructure with hundreds of hosts.
- Test type: blackbox requires more reconnaissance hours than whitebox.
- Complexity: custom applications, proprietary protocols or legacy systems take more time.
- Compliance requirements: OWASP ASVS or PTES may require additional test cases.
Methodology
Scoping
Bepalen van de scope, doelstellingen en regels van de test.
Reconnaissance
Actief en passief verzamelen van informatie over het doelsysteem.
Exploitatie
Actief testen en exploiteren van kwetsbaarheden.
Rapportage
Gedetailleerd rapport met bevindingen en aanbevelingen per prioriteit.
Hertest
Verificatie dat gevonden kwetsbaarheden succesvol zijn opgelost.
Frequently asked questions
How long does a penetration test take?
A web application pentest takes 1-3 weeks turnaround. An infrastructure test 2-4 weeks. Actual testing hours fall within that range. We always schedule in consultation to minimise disruption. During the test you can contact the pentester directly with any questions.
What is the difference between a vulnerability scan and a pentest?
A vulnerability scan is automated and reports known CVEs. A pentest goes much further: we actually exploit vulnerabilities, chain weaknesses into attack paths and manually test for business-logic flaws. We find what Nessus and Qualys miss.
What standards does Zolder follow for pentests?
We are CCV Keurmerk Pentesten certified and work according to PTES, OWASP Testing Guide and OWASP ASVS. Depending on your industry, we can also perform PCI-DSS or BIO-specific test cases. Which standard fits best, we discuss during the scoping call.
Can a pentest disrupt my systems?
We work in a controlled manner and in consultation. High-risk tests are only performed after explicit consent. In practice, our pentests rarely cause disruption. If something does go wrong, the pentester is directly reachable - no ticket system, just a phone call.
How often should you have a penetration test performed?
At least annually, and after significant changes to your application or infrastructure. Many compliance frameworks (ISO 27001, NIS2, PCI-DSS) require periodic tests. After the pentest we discuss what makes sense for your situation - we do not recommend testing more often than necessary.
Related services
Web Application & API Pentest
OWASP, business logic, auth bypass - from login to back-end
// OffensiveInfrastructure Pentest
Internal and external network - from perimeter to domain admin
// OffensiveActive Directory Pentest
Kerberoasting, delegation abuse and privilege escalation in AD
Ready to test your security?
Get in touch with our team for a no-obligation conversation about your security challenges.