CYBERSECURITY FROM IT TO OT

Defend against cyber attacks before they happen with pentesting

PENETRATION TEST

THE ADVANTAGES OF A PENETRATION
TEST WITH CODEWERK

Today, cyber security affects much more than just traditional IT systems. In addition to servers, networks, and applications, OT (operational technology) systems—the technology used in the production, control, and monitoring of plants and machines—are increasingly becoming the focus of attention. Comprehensive protection is essential, especially in companies that operate both IT and OT systems.

A penetration test helps to uncover vulnerabilities in both areas and check the security of the entire company. This allows attack surfaces in traditional IT systems, industrial control systems, and networked production facilities to be identified and secured in a targeted manner. The connection between IT and OT requires a holistic security concept that includes all systems and components. This is exactly where a professional penetration test comes in.

Identify security gaps

Penetration testing uncovers vulnerabilities in IT infrastructure, applications, or networks before attackers can exploit them. The human factor also plays a decisive role here, as human inattention in particular leads to security gaps.

Protect sensitive data

Many companies work with sensitive data. Penetration testing helps them improve their security policies, comply with compliance requirements (e.g., GDPR, ISO 27001), and defend themselves against modern cyberattacks.

Save costs

By identifying vulnerabilities early on, you can avoid costly security incidents and consequential costs. It is not uncommon for cyber attacks to render entire companies incapable of acting. Pentests help to prevent this.

Strengthen customer loyalty

Conducting penetration tests and communicating these measures can significantly strengthen your customers’ trust. You demonstrate that you are proactively investing in your security and that customer data is in safe hands.

In-depth analyses for secure IT and OT systems

Many penetration test providers are not developers themselves. We are different. We develop software for safety-critical applications, such as train control systems. This gives us a more comprehensive understanding of how critical software systems work in depth.

Thanks to our extensive experience in industrial networks and control systems, we carry out targeted penetration tests to identify vulnerabilities in OT systems, SCADA environments, and industrial control systems at an early stage. In doing so, we take into account the special requirements of OT environments, such as availability, real-time capability, and system stability.

Our goal: security without downtime. We help you protect your industrial systems against cyberattacks.

The benefit: Our in-depth analyses also find vulnerabilities that remain hidden during superficial vulnerability scans. This means greater security for your IT and OT infrastructure.

PENETRATION TEST

What we test in a penetration test

From individual components to your entire digital infrastructure, penetration tests allow us to analyze your security on both a small and large scale. The size of the systems or networks to be tested influences the scope and complexity of the penetration test. This does not disrupt ongoing operations.

IT PENETRATION TEST

From networks and servers to the cloud and entire infrastructures.

INDIVIDUAL COMPONENTS

We take a close look at your IT components. When testing a web server, for example, we analyze configurations, patch status, and potential attack vectors such as SQL injections, cross-site scripting (XSS), and directory traversal. We also focus on insecure certificates and weak passwords in order to identify every possible point of entry for attackers. Typical examples of vulnerabilities discovered include buffer overflows, rainbow table attacks, and faulty authentication.

WEB APPLICATIONS

Web applications are often the interface to sensitive data. Our thorough test uncovers vulnerabilities such as SQL injections, cross-site scripting (XSS), and cross-site request forgery (CSRF). We test API endpoints as well as authentication and authorization logics to ensure the confidentiality, integrity, and availability of your application. Web security tests focus specifically on securing web applications and use special web-based attack methods to identify vulnerabilities in these environments.

NETWORK TESTS

We analyze your network segmentation, firewall, and router configurations for vulnerabilities. Open ports, vulnerable protocols, and network shares are examined, as well as the possibility of lateral movement within the network. Regular network checks are crucial to ensure network security and identify potential vulnerabilities early on.

ACTIVE DIRECTORY

The Active Directory is the backbone of your company’s IT infrastructure. We identify vulnerabilities such as inadequate password policies, over-privileged accounts, and insufficiently secured group policies (GPOs). By simulating attacks on AD misconfigurations, we help you protect critical access rights and secure your domain structure.

IOT DEVICES

IoT devices expand your network—and potential attack surfaces. We test smart devices for vulnerabilities in firmware, authentication, and network communication. By uncovering potential backdoors, we prevent your IoT devices from becoming entry points for attackers or sources of dangerous data leaks.

OT PENETRATION TEST

From individual IoT devices to control systems and entire SCADA networks.

FIRMWARE SECURITY ANALYSIS

We examine the firmware of your OT components for hidden vulnerabilities. We take into account various types of vulnerabilities, such as those in authentication mechanisms, insecure storage areas, or faulty update processes. Using reverse engineering and analysis of update processes, we identify security gaps in RTUs, smart meters, and other critical devices.

INDIVIDUAL COMPONENTS

Every link in the chain must be strong. We test individual components such as programmable logic controllers (PLCs) for known and unknown vulnerabilities. We check for insufficiently protected network interfaces, vulnerable protocols like Modbus, and susceptibility to manipulated commands.

HUMAN-MACHINE INTERFACES (HMI)

The interface between human and machine is often the target of cyberattacks. We examine your HMIs for security gaps such as cross-site scripting (XSS), SQL injection, and other attack vectors.

NETWORK-BASED TESTS

In interconnected OT systems, even one single vulnerability can have far-reaching consequences. Our network-based penetration test examines your infrastructure for insufficient segmentation, vulnerable protocols, and missing encryption. We simulate network movements, attempt to gain access to critical systems, and intercept network traffic.

INDUSTRIAL CONTROL SYSTEM (ICS)

We take a holistic view of your industrial control system – from individual control devices to the higher-level SCADA system. Organization plays a central role in the planning, execution, and evaluation of OT penetration tests, especially in coordinating security measures and selecting appropriate test methods. Our comprehensive test analyzes configurations, uncovers firmware vulnerabilities, checks remote access methods, and evaluates your patch management. This secures your entire production environment against modern cyber threats.

PENETRATION TESTS FOR INDIVIDUAL DEVICES OR ENTIRE INFRASTRUCTURES

THE TEST IN 5 STEPS

HOW A PENETRATION
TEST WORKS

Our penetration tests follow a structured, transparent process. From the kick-off to the final report, we work closely with you. The goal is to sustainably strengthen your digital resilience and leave no opportunity for hackers.

/
WHAT WE OFFER

ONE TEST. MANY COMPONENTS.

Our penetration tests always begin with threat modeling. This means that we identify and prioritize potential security threats. Even before the actual test is carried out, we thoroughly review all available information about the target system to maximize the effectiveness of the test.

CODE REVIEW
CODE REVIEW

Vulnerability analysis with expert knowledge from software development.

REVERSE ENGINEERING
REVERSE ENGINEERING

Examination of programs and firmware to identify critical information.

NETWORK ANALYSIS
NETWORK ANALYSIS

Detailed review of network security to detect vulnerabilities.

PROCESS CONTROL SYSTEM
PROCESS CONTROL SYSTEM

Security analysis and protective measures for industrial process control systems.

FUZZING (WHITEBOX/ BLACKBOX)
FUZZING (WHITEBOX/ BLACKBOX)

Automated testing to identify vulnerabilities in software and systems.

ACTIVE DIRECTORY AUDIT

ACTIVE DIRECTORY AUDIT

Review and secure access rights in your directory service.

SIEM TEST

SIEM TEST

We test whether your SIEM also detects penetration test attacks.

COMPLIANCE

DO YOU MEET THE COMPLIANCE REQUIREMENTS FOR CYBERSECURITY?

We offer penetration tests that meet the testing requirements of specific standards and regulations. These include:

INDUSTRY

Ensuring compliance with
industrial security standards.

STANDARDS MET

• IEC 62443-4-2
• IEC 62443-3-3

CRITICAL INFRASTRUCTURES (KRITIS)

Protection of critical infrastructures through targeted security audits.

STANDARDS MET

• NIS2
• CRITICAL INFRASTRUCTURES

MEDICAL

Ensuring cybersecurity compliance in the medical sector.

STANDARDS MET

• Medical Device Regulation

Get a no-obligation consultation
for a penetration test

Are you ready to assess the strength of your cybersecurity? We are happy to advise you.

FAQs

What is pentesting?

Pentesting, also known as penetration testing, is a key IT security procedure for testing the resilience of IT systems, networks, and applications against attacks. Our experienced testers and developers simulate targeted attacks on your IT or OT infrastructure to uncover vulnerabilities and security gaps before they can be exploited by real attackers. A penetration test can be carried out both internally—from the perspective of an employee—and externally, from the perspective of an external hacker.

The aim is to test the security of all IT systems and networks, identify vulnerabilities, and develop specific measures to remedy them. This strengthens the IT infrastructure in the long term and minimizes the risk of cyberattacks.

Regular penetration testing is an indispensable part of any IT security strategy, especially at a time when companies and organizations are increasingly dependent on digital applications and networked systems.

What pentest tools and open-source solutions are available ?

A wide range of powerful tools and open-source solutions are available for performing penetration tests, which are used specifically to identify vulnerabilities and security gaps. The best-known pentesting tools include:

  • Nmap: A versatile tool for scanning networks and detecting open ports. Nmap helps analyze the attack surface of IT systems and identify potential vulnerabilities.
  • Wireshark: This tool enables detailed analysis of network traffic and helps to uncover suspicious activity or insecure protocols in networks.
  • sqlmap: A specialized tool for testing databases that specifically searches for SQL injection vulnerabilities and thus checks the security of web applications.
  • Zed Attack Proxy (ZAP): An open-source tool that is particularly suitable for testing web applications and automatically searches for security vulnerabilities.
  • Karkinos: A lightweight penetration testing tool that supports various security tests and can be flexibly integrated into existing testing processes.
  • Scapy: A Python-based tool that enables the manipulation and analysis of data packets, allowing targeted testing of network protocols.
  • OpenSCAP: A collection of tools that use the Security Content Automation Protocol (SCAP) to perform automated security tests and compliance checks.
WHAT CERTIFICATIONS DO YOUR PENETRATION TESTERS HAVE?

Our penetration testers adhere to the renowned OSCP standard (Offensive Security Certified Professional). We have more than ten years of experience in software development for industry and rail systems, and we recognize the importance of recognized certifications in penetration testing.

HOW LONG DOES A PENETRATION TEST TAKE?

Depending on the size of the system, we begin the initial analysis 30 days after first contact. After creating a tailored test plan, we start the penetration test. We document every step carefully and keep you regularly informed about the progress. This way, there are no surprises in the final report.

WHAT CVEs CAN CODEWERK PROVIDE?

Due to confidentiality agreements, we cannot disclose specific CVEs. Our expertise is demonstrated through our work together. Let’s work together to improve the security of your system and uncover potential vulnerabilities.

WHAT DOES A PENETRATION TEST COST WITH CODEWERK?

The cost depends on the scope and complexity of your system. Contact us for a customized offer. Together, we will find the right solution for your security requirements.

DO YOU HAVE A SAMPLE REPORT?

Yes, we are happy to provide you with a sample report. Please contact us, and we will send you an example right away.

Schedule a consultation

Send us a message