Penetration Testing Services in India & UAE.
Goal-oriented penetration testing across infrastructure, web, mobile, cloud and Active Directory. We chain low-severity findings into business-impacting compromises — and deliver a report your engineering team can actually fix.
Seven phases. No shortcuts.
The Penetration Testing Execution Standard, executed end-to-end. Every Macksofy engagement runs the same seven-phase protocol regardless of scope.
- 01PTES · Phase 01 of 07
Pre-engagement
Scope, authorize and classify crown-jewel assets before a single packet flies.
- Mutual NDA + scoping
- Rules of engagement (RoE), authorization letter
- Crown-jewel asset identification
1–2 daysOutput · Signed SOW + RoE - 02PTES · Phase 02 of 07
Intelligence gathering
Active and passive reconnaissance to map every asset an attacker would see.
- Active + passive recon (OSINT, ASN, DNS, certificate transparency)
- Attack surface mapping
- Technology stack fingerprinting
2–3 daysOutput · Attack-surface map - 03PTES · Phase 03 of 07
Threat modeling
STRIDE-style decomposition that prioritises the attack paths your industry actually faces.
- STRIDE / PASTA-style threat decomposition
- Attacker profiles aligned to your industry threat actors
- Prioritized attack paths
1 dayOutput · Attack-path priority matrix - 04PTES · Phase 04 of 07
Vulnerability analysis
Authenticated + unauthenticated scanning paired with manual review where it matters.
- Authenticated + unauthenticated scanning (Nessus, Nuclei)
- Manual code/config review where in-scope
- Credential weakness assessment
3–5 daysOutput · Triaged vulnerability backlog - 05PTES · Phase 05 of 07
Exploitation
Manual exploitation chains and custom payloads — never just a Nessus report with a logo.
- Manual exploitation chains (we don't ship Nessus reports)
- Custom payloads where commercial tooling fails
- Validated impact, not theoretical CVSS
4–7 daysOutput · Exploited findings with PoCs - 06PTES · Phase 06 of 07
Post-exploitation
Privilege escalation, lateral movement, AD compromise paths — what would a real adversary do next?
- Privilege escalation, lateral movement
- AD compromise paths via BloodHound
- Sensitive data access demonstration
2–3 daysOutput · Lateral-movement evidence - 07PTES · Phase 07 of 07
Reporting & retest
Board-ready executive summary plus developer-friendly remediation, with a free 30-day retest.
- Executive summary for the board
- Technical detail with PoC for each finding
- Free retest within 30 days of remediation
3–5 days + retestOutput · Executive + technical report
Scanners cover ~30% of real-world attacks.
The remaining 70% — BOLA, JWT alg confusion, OAuth flow hijacks, race conditions, business-logic bypass, kerberoastable accounts, ACL misconfig — requires human consultants. Macksofy weights manual testing heavily.
- Quantify real risk before regulators or attackers do
- Satisfy CERT-In, RBI System Audit, SEBI CSCRF and ISO 27001 requirements
- De-risk product launches and M&A due diligence
- Train your blue team via a free purple-team handoff
What we found. What it cost the attacker.
Finding · Chained BOLA + JWT alg=none → full customer PII exfiltration capability
Impact · Critical — all customer balances + KYC accessible by any logged-in user
Finding · Kerberoastable service account → DA in 4 hours via NoPac (CVE-2021-42278)
Impact · Domain Admin compromise simulated and contained inside red-cell window
Finding · API key in shared_prefs + insecure deeplink → account takeover at scale
Impact · Critical — pre-prod fix shipped before public release
Tools we trust. And tools we built ourselves.
Burp, Nmap, BloodHound, Impacket — the open-source canon every senior pentester reaches for first. We use them because they’re battle-tested, and because the operators on your engagement have spent thousands of hours inside each one.
But every now and then we hit a wall the commercial tools can’t break through — and when that happens, we don’t shrug. We write the Burp extension, the recon helper, the AD primitive that gets us past it. Years of that work adds up. Your engagement gets all of it.
One engagement. Eight frameworks.
Information security audit empanelled by Indian CERT
RBI Cyber Security Framework + System Audit Reports
Cybersecurity & Cyber Resilience Framework for capital markets
ISMS implementation, internal audit and certification support
Payment card industry — ASV scans, internal audit, pentest
Article 32 controls, DPIA, data flow mapping
Healthcare data protection (relevant for India + UAE health-tech)
UAE National Electronic Security Authority compliance
Rated 4.9 ★ from 612 client reviews.
“We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.”
“The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.”
“Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.”
Things people ask before signing.
Get a fixed-price proposal in 48 hours.
Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.
- CERT-In Empanelled
- EC-Council ATC · CompTIA Authorized
- 20,000+ professionals trained
- India + UAE engagements
