Macksofy Technologies
Internal · External · AD · Hybrid Cloud

Network Penetration Testing

Goal-oriented network penetration testing across your external attack surface, internal segments, Active Directory and cloud-to-on-prem boundaries. We chain misconfigurations, exposed services and credential weaknesses the way a real attacker would — and report so your network team can fix, not just acknowledge.

Engagement at a glance
  • Quote SLA48 hours
  • Typical engagement5–15 working days
  • RetestFree within 30 days
  • Reporting formatCERT-In + ISO + SOC 2 ready
  • Team100% in-house · OSCP / OSWE / OSEP
What this actually looks like

A Network Pentest engagement, in plain language.

A Macksofy network pentest is not a Nessus scan with a logo. We map your external footprint (ASN, DNS, certificate transparency), find the exposed Citrix portal or Confluence instance, get the foothold, kerberoast a service account, run BloodHound, find the over-permissioned admin path, and demonstrate the domain compromise. Then we test segmentation — does compromising the user VLAN actually reach the database tier? We pair the findings with concrete remediation: ACL changes, GPO updates, segmentation rules, EDR exclusions reviewed.

Business impact
  • Quantify real network-side risk vs. theoretical CVSS scores
  • Satisfy CERT-In annual VAPT, RBI System Audit, SEBI CSCRF and ISO 27001 network testing requirements
  • Validate that segmentation actually segments — not just on paper
  • De-risk M&A integrations and datacenter migrations
Methodology

Phased delivery — every step documented.

Interactive walkthrough of how we run a Network Pentest engagement — tap a phase to expand its activities.

01
Methodology · slide 1 of 6
Auto-advancing
Phase 01 / 6
3 activities

1 · External attack surface mapping

  • ASN, subdomain, certificate transparency, OSINT recon
  • Exposed service enumeration (VPN, mail, web, API, file-share, RDP)
  • Cloud-edge attack surface (S3, ALB, exposed buckets, public endpoints)
Tooling

Industry-standard + custom.

We use the same tooling top BFSI red teams operate — combined with Macksofy in-house extensions and proprietary scripts where commercial tools fall short.

Tools we operate
NmapNessusNucleiMetasploitBloodHound + SharpHoundCrackMapExec / NetExecImpacketResponder + NTLMRelayXMimikatz / RubeusHashcatCustom Macksofy tooling
Industries served

Sectors we operate in

Banking & Financial ServicesInsurance & InsurTechGovernment & PSUManufacturing & EnergyHealthcare & HealthTechTelecomRetail & E-commerceSaaS & Product Companies
Deliverables

What you get

  • Executive summary (board-ready, 2–3 pages)
  • Technical report with CVSS 3.1 scoring and PoC per finding
  • Attack-path diagram (perimeter → domain compromise)
  • Segmentation validation matrix
  • MITRE ATT&CK TTP mapping
  • Remediation guidance per finding (network-team friendly)
  • Free retest within 30 days of fix submission
  • CERT-In / ISO 27001 / SOC 2 compliance letter
Case studies

Anonymized engagement snapshots.

Listed Manufacturer (Pune)

Scope · External + internal + AD, 8 sites + DR datacenter

Finding: External Citrix → kerberoast → DA in 6 hours via misconfigured constrained delegation

Critical — fixed before next IT-audit cycle, no incident occurred

Risk severity · Critical
LMHC
Government Department (Delhi)

Scope · Internal pentest of segmented citizen-data network

Finding: User VLAN → database VLAN reachable via unfiltered SMB on a forgotten jump-host

High — segmentation gap remediated, MeitY data-localisation control restored

Risk severity · High
LMHC
Indicative pricing · INR

Transparent tiers. No surprises at quote time.

Indicative price ranges based on typical Indian engagements. Final fixed-price quote within 72 hours of the discovery call.

Free 30-day retest · CERT-In format reports
Tier 01

Focused

₹2.5L–₹5L
Single asset or app
  • Manual + tooled testing
  • CERT-In format report
  • Free 30-day retest
Request a fixed-price quote
Tier 02

Stack

₹6L–₹12L
Multi-asset engagement
  • Everything in Focused
  • Web + API + mobile coverage
  • Executive + technical briefings
Request a fixed-price quote
Tier 03

Programme

Starts at ₹15L
Quarterly retainer · large estate
  • Everything in Stack
  • Quarterly cycles + post-release retests
  • Same consultants throughout
Request a fixed-price quote

Note · Indicative pricing in INR. Final quote depends on scope, asset count and engagement window. Fixed-price proposal within 72 hours.

What clients say · Trusted India + UAE

Rated 4.9 ★ from 612 client reviews.

CERT-In Empanelled
Govt of India · MeitY
EC-Council ATC
Authorized Training
ISO 27001 Certified
Info Security Mgmt
We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.
AK
Aisha Khan
Information Security Manager · Listed Fintech · BKC, Mumbai
The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.
IK
Inspector K. Joshi
Cyber Cell · Maharashtra Police · Mumbai
Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.
VI
Vivek Iyer
DevSecOps Lead · Healthcare SaaS · Hyderabad
FAQ

Things people ask before signing.

Both is the common scope — external proves the perimeter, internal proves what an insider or post-phish attacker can reach. We quote them independently or bundled.
Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.