Precursor Security
CREST-Accredited External Penetration Testing

External Network Penetration Testing

We test your firewalls, VPN gateways, mail servers, DNS infrastructure, and cloud perimeter for vulnerabilities that an unauthenticated attacker could exploit to reach your internal systems. CREST-accredited testing: no automated-scan padding, no bloated reports.

CREST-accredited external penetration testing
From £2,500 | Fixed-price quotes
Manual exploitation, zero automated-scan padding
Satisfies PCI DSS 11.3, ISO 27001:2022 A.8.8, Cyber Essentials Plus
Free rescoping for infrastructure changes within 30 days
Scroll
Methodology

Perimeter Testing.
Beyond the Firewall.

Automated vulnerability scanners flag known CVEs. Our CREST-certified consultants follow PTES phases and CREST CRT technical guidelines to find what scanners miss: misconfigured cloud perimeters, forgotten subdomains, and authentication bypasses that represent real breach risk.

Reconnaissance

Attack Surface Discovery

We enumerate your entire external attack surface using certificate transparency logs, ASN lookups, passive DNS analysis, and OSINT techniques, finding forgotten subdomains, shadow IT, and exposed development portals that your team did not know were public-facing.

Authentication

Identity & Access Testing

We enumerate authentication endpoints and test against real-world attack techniques: credential stuffing using leaked databases, password spraying respecting lockout thresholds, and MFA bypass via token replay, session fixation, and push-notification fatigue.

Cloud Perimeter

Cloud Estate Enumeration

We enumerate your cloud estate via OSINT, test exposed management APIs, and assess IAM misconfiguration that could allow unauthenticated access: open S3 buckets, misconfigured security groups, and exposed management interfaces across AWS, Azure, and GCP.

Exploitation

Network Service Exploitation

Active exploitation of exposed services: SSL VPN default credentials, unpatched Exchange servers (ProxyShell, ProxyNotShell), exposed RDP with weak passwords, misconfigured SMTP relays, and DNS zone transfer leaks. We chain low-severity issues into high-impact attack paths that scanners cannot construct.

Validation

Zero False Positives

Every finding is manually confirmed exploitable in your environment. We contextualise CVSS scores to your specific architecture: a critical CVE on a low-business-impact asset is reported accordingly. Automated scans return 200+ findings; our reports highlight findings that actually matter.

Deliverables

Actionable Intelligence

Findings are prioritised by real-world business risk, not just CVSS score. Every vulnerability includes a documented attack path, business impact statement, and prioritised remediation guidance. Reports include an executive summary for board or audit committee submission.

Executive Summary

Perimeter Risk Profile

Your external network is the front line. 60% of successful breaches exploit known, unpatched vulnerabilities in internet-facing services.

Critical Speed
2Days

Time to Breach

Average time for an attacker to breach an unmonitored perimeter (Mandiant).

Patch Gap
60%

Unpatched Assets

Of successful external breaches involve known, unpatched vulnerabilities (CVEs).

Verified Scope
6+

Compliance Frameworks

Testing satisfies PCI DSS, ISO 27001, CE Plus, NHS DSPT, NCSC CAF, and UK cyber insurance requirements.

Mapped
Controls
PCI DSSReq 11.3
ISO 27001Annex A.8.8
CE PlusWeb Controls
NCSC CAFObjective B.4
Real Findings

What We Find That Scanners Cannot.

Anonymised examples from recent external network penetration testing engagements. These are the findings that automated vulnerability scanners flag as informational, or miss entirely.

Critical
Professional Services

SSL VPN Default Administrator Credentials

The organisation's Fortinet SSL VPN appliance was accessible on the public internet with default admin credentials (admin:admin). An attacker could authenticate to the management interface, modify firewall rules, and establish a persistent VPN tunnel directly into the internal network.

CVSS 9.8T1133 External Remote Services
Business ImpactFull internal network access from the internet, bypassing all perimeter controls.
Critical
Financial Services

Exposed RDP via Misconfigured Cloud Security Group

An Azure Network Security Group allowed inbound RDP (port 3389) from 0.0.0.0/0 on a domain-joined server. The server accepted NLA authentication with a weak local administrator password discoverable via credential spraying.

CVSS 9.1T1021.001 Remote Desktop Protocol
Business ImpactDirect access to domain-joined server; lateral movement to Active Directory.
High
Retail / E-commerce

Subdomain Takeover via Dangling DNS CNAME

A DNS CNAME record (staging.example.com) pointed to a deprovisioned Azure App Service. An attacker could claim the orphaned hostname, serve arbitrary content on the organisation's subdomain, and harvest credentials via a convincing phishing page.

CVSS 7.5T1584.001 Domains
Business ImpactCredential harvesting under trusted brand domain; session cookie theft.
Critical
Healthcare

Unpatched Exchange Server (ProxyShell Chain)

An on-premise Microsoft Exchange Server exposed to the internet was missing patches for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207. The full ProxyShell chain was exploitable, allowing unauthenticated remote code execution as SYSTEM.

CVSS 9.8T1190 Exploit Public-Facing Application
Business ImpactFull server compromise; access to all organisational email and Active Directory.
Common Triggers

When Do Organisations Commission This Test?

External penetration testing is typically triggered by one of these six scenarios. If any apply, you are in the right place.

Annual Compliance Mandate

Your PCI DSS QSA or ISO 27001 auditor requires annual external penetration testing evidence.

Infrastructure Change

You have migrated to a new cloud provider, deployed a new VPN endpoint, changed firewall rules, or exposed new services to the internet since your last test.

Cyber Insurance Renewal

Your cyber insurance underwriter requires evidence of annual external penetration testing by a CREST-accredited provider for policy renewal or claims eligibility.

M&A Due Diligence

You are acquiring or merging with another organisation and need to assess the external attack surface of the target before integration.

Post-Breach Validation

A recent security incident or near-miss has prompted a post-event external security assessment to validate your perimeter hardening.

First External Test

Your organisation has never commissioned an independent external penetration test and you want to baseline your perimeter security posture.

Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction and maximise the value of the testing window.

Step 01

Reconnaissance (OSINT)

Passive intelligence gathering: finding targets, employee emails, leaked credentials, and technical details without touching your servers. Sources include Shodan, Censys, certificate transparency logs, and leaked credential repositories.

OutputAttack Surface Map
Step 02

Discovery & Scanning

Active scanning to find open ports, running services, and known CVEs. Service fingerprinting, SSL/TLS analysis, and DNS zone transfer attempts before any exploitation.

OutputVulnerability Register
Step 03

Manual Exploitation

Active exploitation of confirmed weaknesses, bypassing authentication controls, chaining low-severity issues to achieve meaningful access, and testing firewall rulesets for bypass conditions.

OutputExploitation Evidence
Step 04

Reporting & Debrief

Full technical report and executive summary with attack paths, business impact, and prioritised remediation. Remediation retesting included within the agreed window.

OutputCompliance-Ready Report
Deliverables

What You Get

Every external network penetration test includes the following deliverables, formatted for both technical teams and non-technical stakeholders.

Executive Summary (suitable for board, audit committee, and direct auditor submission)
Technical Report with CVSS v3.1 scored findings, screenshot evidence, and reproduction steps
Network topology and attack path diagrams for every exploited chain
Remediation Prioritisation Guide with specific configuration fixes and patch references
CREST-certified findings certificate and Letter of Attestation (on request)
Remediation debrief call with your infrastructure and security teams
Free retest of remediated critical and high-severity findings within the test window

Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats.

Scope Clarity

External vs Internal Testing

Not sure whether you need external, internal, or both? Here is the distinction.

External Testing

What external testing covers

Simulates an attacker on the open internet. Tests only what is publicly visible: firewalls, VPN gateways, web applications, mail servers, and cloud management interfaces. No prior access assumed.

Internal Testing

What internal testing covers

Simulates an attacker with a foothold inside your network. Tests lateral movement, Active Directory security, and privilege escalation from inside the firewall.

View internal network penetration testing

Most organisations commission both. External testing covers your internet-facing perimeter. Internal testing covers your inside-the-firewall environment. A CREST-accredited provider will scope the correct combination based on your compliance requirements and threat model.

Fixed-Price Engagements

External Pen Test Pricing

All pricing includes a scoping call, manual testing, written report, executive summary, and one round of remediation retesting.

Small Perimeter

£2,500-£6,000

1-20 external IPs. 2-4 day engagement.

Mid-Size Perimeter

£6,000-£8,000

20-50 IPs. Complex perimeter, cloud included.

Enterprise Scope

£8,000+

50+ IPs. Enterprise scope. Fixed-price quoted.

Every engagement includes

  • Pre-engagement scoping call (no charge)
  • Passive OSINT reconnaissance
  • Active perimeter scanning and manual exploitation
  • Manual verification of all findings (zero automated-scan padding)
  • Full technical report with CVSS-contextualised findings
  • Executive summary suitable for board or audit committee
  • Remediation guidance for every finding
  • Free remediation retesting within the assessment window
Auditor Ready

Mapped directly to your regulatory controls.

Our CREST-certified report includes a compliance mapping matrix that cross-references our exact technical findings to the specific framework clauses your auditor requires.

PCI DSS 11.3

Annual requirement

External security test (annual and post-significant-change requirement)

ISO 27001:2022

Annex A 8.8

Management of technical vulnerabilities

Cyber Essentials Plus

Web Controls

External vulnerability testing requirement

NHS DSPT

Standard 9.2.2

Penetration testing controls for NHS supply chain organisations

NCSC CAF

Objective B.4

Cyber Assessment Framework security testing

UK Cyber Insurance

Underwriter req.

Annual external testing evidence for policy renewal and claims eligibility

CREST

Globally Accredited Consultants

All testing is conducted by CREST-certified professionals.

Verify Accreditation
After Testing

Close the Loop.
After the Test.

Your external penetration test identifies what is exploitable today. We feed those exact findings into our 24/7 Managed SOC and EdgeProtect attack surface management, building custom detection rules for your perimeter and continuously monitoring your external infrastructure between annual tests.

Explore Defensive Services
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

External network penetration testing typically costs between £3,500 and £10,000 depending on the number of external IP addresses, complexity of your perimeter, and scope of testing. A standard external test for 1-20 IP addresses averages £6,000 for 3-5 days of testing. Larger organisations with 50+ IP addresses and complex cloud infrastructure typically cost £8,000-£10,000. We provide fixed-price quotes after reviewing your IP ranges and infrastructure architecture.

External penetration testing simulates an attacker on the open internet attempting to breach your organisation. It targets your public-facing assets (firewalls, VPN gateways, mail servers, web applications, and cloud management interfaces) to find exploitable weaknesses before real attackers do. Unlike automated vulnerability scanning, external penetration testing involves manual exploitation, attack chain construction, and OSINT-led discovery to demonstrate real-world business impact.

External penetration testing simulates an attacker with no prior access to your network, testing only what is publicly visible from the internet: your firewalls, VPN gateways, web applications, and cloud management interfaces. Internal penetration testing simulates an attacker who has already gained a foothold inside your network, testing lateral movement, Active Directory security, and privilege escalation. Most organisations that require comprehensive assurance conduct both. A CREST-accredited provider will scope the correct combination based on your compliance requirements and threat model.

External penetration testing covers all internet-facing assets within the agreed scope: firewall and router interfaces, VPN gateways (including SSL VPN), web applications and APIs, mail servers (SMTP, OWA, Exchange Online), DNS infrastructure (including zone transfer testing), remote access portals, cloud management consoles and exposed storage (AWS S3, Azure Blob), and any other services accessible from the public internet. Scope is defined during the pre-engagement scoping call and documented in the test authorisation letter.

We recommend annual testing at minimum, or after any material infrastructure change: cloud migrations, new VPN endpoints, firewall rule changes, or new application deployments. PCI DSS 11.3 mandates annual external penetration testing (and after significant changes). ISO 27001:2022 Annex A 8.8 requires a managed programme of technical vulnerability testing. Cyber Essentials Plus requires an external vulnerability assessment as part of recertification.

No. A vulnerability scan is an automated check for known patches. A penetration test is a manual, human-led simulation that attempts to actually exploit those vulnerabilities, chain them together, and find logic flaws that scanners miss. Vulnerability scanners might identify 100 potential issues, but a penetration test confirms which ones are actually exploitable and demonstrates real-world attack paths that matter to your business.

Our external network penetration testers hold industry-recognised certifications including CREST CRT (CREST Registered Tester), CREST CCT (Certified), and Offensive Security OSCP. All engagements are conducted by certified testers; automated tooling is used only as a discovery accelerator, never as the primary testing mechanism. Precursor Security is a CREST Member Company. Our accreditation can be verified at crest-approved.org.

External testing is designed to be non-disruptive and safe for production environments. We coordinate testing windows with your team and avoid destructive attacks like volumetric DDoS. However, in rare cases, exploitation attempts may trigger security alerts or cause temporary service degradation (similar to real attacker activity). We maintain abort codes and immediately cease testing if any critical systems are at risk.

Generally, no. We test for vulnerabilities that could lead to DoS (like weak application logic), but we do not perform volumetric DDoS attacks as they can disrupt your actual business operations.

For a Black Box test, we might only need your main domain name. For Grey Box or White Box tests, you might provide a list of IP addresses and CIDR ranges to ensure we target all your authorised assets.