Outdated and unpatched services
Web servers, VPN appliances, and middleware running software with known, exploitable vulnerabilities.
Understand how your Internet-facing systems appear to attackers, and fix exploitable weaknesses before they are used against you.
Every day, automated scanners and targeted adversaries inspect your Internet-facing assets for weaknesses. External infrastructure penetration testing shows you what they see – and what they can exploit – under controlled conditions.
Cyber Defence combines automated reconnaissance with deep manual testing to identify vulnerabilities, misconfigurations, and weak controls across your perimeter, helping you close the gaps that matter most.
External infrastructure testing typically includes:
• Public-facing web servers, reverse proxies, and load balancers
• VPN gateways and remote access portals
• Mail gateways and secure email services
• DNS, certificate and PKI configuration
• Exposed administrative interfaces and management planes
• Perimeter firewall behaviour and filtering
The exact scope is defined with you in advance, and can be based on IP ranges, domains, or specific critical services.
Discovery of hosts, services, technologies, and exposures using OSINT, DNS analysis, certificate transparency, and network scanning.
Automated and manual analysis to identify outdated software, weak configurations, exposed services, and known vulnerabilities.
Targeted exploitation attempts against identified weaknesses to determine real-world impact and avoid false positives.
Mapping of how chained issues – such as weak VPN, exposed admin interfaces, or default credentials – could lead to deeper compromise.
Clear technical findings, risk ratings, and practical remediation steps for your infrastructure and network teams.
Common findings
While every environment is different, recurring weaknesses include:
Web servers, VPN appliances, and middleware running software with known, exploitable vulnerabilities.
VPNs and remote portals with weak authentication, insufficient hardening, or legacy protocols enabled.
Management interfaces, orchestrators, and consoles reachable from the Internet without adequate controls.
Domains, subdomains, and certificates revealing internal naming schemes, technologies, or forgotten systems.
Overly permissive rules, unnecessary open ports, and inconsistent segmentation at the edge.
Unmanaged or forgotten assets presenting high-risk exposures outside standard vulnerability management processes.
Share your external IP ranges, domains, and critical services. We will propose a scoped engagement that focuses on the systems that matter most.
Our penetration tests are backed by Cyber Defence’s Threat Intelligence platform and SOC365 operations. We do not just test against generic vulnerabilities – we test against the ways attackers are currently targeting organisations like yours.
Findings from external tests can be fed directly into SOC365 detections and attack surface monitoring to provide continuous protection beyond the engagement.