Choose country/ region and language

Penetration Tests

Penetration test | TÜV Rheinland

Detect security vulnerabilities in time and protect valuable data.

The advancing digitalization is noticeable in every industry and in every company size. Whether in the chemical and pharmaceutical industry, automotive industry, finance and insurance industry or in small and medium-sized enterprises (SMEs), the changes are the same: processes are digitized and systems are interconnected, critical business applications are increasingly web and/or mobile-based and more and more applications and data are being moved to the cloud.

This opens up new attack options for cybercriminals.This development is also confirmed by the results of our Cybersecurity Trends 2024 , which show that cyberattacks are increasingly threatening the existence of companies and that attacks are becoming more and more professional. The growing importance of cyber resilience is also reflected in the constantly increasing regulation in this area, some of which even require penetration tests to be carried out.

The digital transformation requires new thinking on the part of corporate management and IT managers in terms of cybersecurity and data protection measure since cyberattacks represent a challenge in everyday business that should not be underestimated.

Penetration Tests by TÜV Rheinland – Your benefits

✔ Identify vulnerabilities early – We detect security gaps before attackers can exploit them.

✔ Ensure compliance – Meet all relevant security standards and strengthen the trust of your customers and partners.

✔ Certified experts – Our testers are highly qualified and hold recognized certifications such as OSCP.

✔ State-of-the-art attack scenarios – Our experts stay up to date with the latest threats through continuous training.

✔ Technical specialization – Each tester focuses on a specific area to ensure maximum expertise.

✔ Efficient project management – Clear processes, structured reports, and professional management ensure smooth testing.

✔ TÜV Rheinland stands for quality and expertise – As an experienced and independent testing body, we offer penetration tests that meet the highest standards.

Therefore, identify potential vulnerabilities in your IT infrastructure by means of a penetration test, check the effectiveness of existing protective measures and find out where systems do not meet the security requirements.

Get an objective assessment of your IT security and discover your vulnerabilities before hackers find them.

Facts about the penetration test | TÜV Rheinland

Different variants of a penetration test

Various methods can be used to identify vulnerabilities. Which option is the right one for your company depends on your existing IT infrastructure In a personal conversation, we determine your needs and analyze the existing systems to find the right penetration test method for you. Take a look at our pentesting portfolio.

Penetration Testing for Large Language Models (LLMs)
External penetration test
Internal penetration test
Adversary Simulation (Red Team Campaign)
Testing of embedded systems, medical devices & automotive components
Source Code Analysis
Web Application Testing
Remote penetration test (hack box)
External penetration test
Internal penetration test
Adversary Simulation (Red Team Campaign)
IoT Penetration Testing
Source Code Analysis
Web Application Testing
Remote penetration test (hack box)

Companies are increasingly deploying Large Language Models (LLMs) in chatbots, assistant systems, or automated decision-making processes. However, these powerful AI models pose significant security risks – ranging from uncontrolled data leaks to manipulation through targeted attacks. With our specialized LLM penetration testing, we identify vulnerabilities and help you secure your AI models reliably.

What vulnerabilities do we test for?

Our tests are based on the OWASP LLM Top 10 and cover, among others, the following risks:

  • Prompt Injection: Manipulating input prompts to alter the model’s behavior or extract confidential information.
  • Data Leaks: Unintentional disclosure of sensitive data from the training process or during use.
  • Model Theft: Unauthorized access to the model to replicate it or use it for malicious purposes.
  • Training Data Poisoning: Insertion of manipulated training data to influence model outputs.
  • Misuse and Security Gaps: Exploiting LLMs for disinformation, spam, or social engineering, as well as insecure API usage.

The external penetration test symbolizes the "classic" cyber attack from the outside. Here, our IT security expert attempts to penetrate the company's internal network via the systems accessible from the Internet. The focus of the investigation is on the firewall and systems of the Demilitarized Zone (DMZ - a network that acts as a buffer zone and is monitored by the firewall, such as web or mail servers) in order to subsequently uncover the possibilities of data access or theft. Our experts also try - if allowed - to penetrate the internal network from the DMZ.

In an internal penetration test, the starting point is within the corporate network, i.e. the attacker has already gained access to the internal network. This simulates the case where an attacker is already on an employee's device. Thus, the goal of the internal pentest is to determine what damage can occur if corporate access is criminally misused. An attack from within the company can often cause more damage in less time than an external attack, as some protection systems have already been bypassed or overcome.

In this method, our experts simulate a cyber attack using the tactics, techniques, and procedures of real attackers. We determine the focus and objectives of the Red Team campaign together with you in advance. If required, we work with you to identify the most critical attack vectors - in relation to your cyber resilience - before moving on to an attack simulation.

Compared to a penetration test, the goal of a Red Team campaign is not to uncover as many vulnerabilities as possible, but to achieve the defined campaign objective with a targeted exploitation of relevant vulnerabilities. The results provide you with information about the resilience of your company or division with regard to cyber attacks. In addition, the results help your own experts to optimize internal monitoring systems and processes within the company in order to detect attacks earlier. This minimizes the risk of major damage to your company.

Further information about the Adversary Simulation can be found here in our information flyer.

During the IoT penetration test, our experts check your IoT ecosystem from a hacker's perspective and detect vulnerabilities and security issues. For comprehensive protection, we test the entire IoT ecosystem – all connected services and applications. If required, we can also examine individual components and support you with the following individual services:

  • Security analysis of the IoT devices
  • Security analysis of a medical device
  • Security analysis of automotive components
  • Security analysis of mobile applications
  • Security analysis of the backend
  • Security assessment of the backend

Read detailed information about IoT penetration testing in our related flyer. Learn more.

Software can conclude programming errors, security gaps or functions, which can be abused for cyberattacks. The source code audit analysis is capable of detecting those potential safety risking weak points in the functionality and structure of the application.

Already during the development phase we highly recommend our audit as quality assurance measure.

For this purpose, our specialists need access to the entire source code or selected modules, which are analyzed by us from a development perspective using automated tools and manual means.

You receive a detailed report, documenting weak points and identifying suitable measures for targeted remediation.

Request a quote now.

The web application testing is a penetration test based on the Open Web Application Security Project (OWASP) Testing Guide. The identification of the OWASP Top 10 vulnerabilities are the focus of the investigation. However, our experts also look for less common application-specific vulnerabilities in order to achieve the best possible level of protection for your web application. Afterwards, we summarize the results of the analysis as well as recommendations for remedying the vulnerabilities in a report.

You can find more information in our flyer Security for your web application.

The hack box enables our experts to perform penetration tests remotely. The remote solution is particularly advantageous when the presence of our colleagues is challenging for various reasons (for example home office workplaces, or large geographical distances). The hack box is a specially configured and protected computer that is delivered by mail. The installation of the hack box into the internal network is designed for simplicity and does not require any special prior knowledge, which makes the collaboration between us and the users easy.

You can find out all the details about the process and handling of the hack box here.

Detect security vulnerabilities thanks to pentests

General procedure of a penetration test | TÜV Rheinland

With the help of penetration testing, or pentesting, we check your existing IT infrastructure (networks and IT systems) and web applications (e.g. online shops, customer portals, online banking) and mobile applications for potential vulnerabilities that could provide criminals with a target for cyberattacks. In order to uncover vulnerabilities and security gaps and to optimally assess potential risks, our IT experts proceed as follows:

  1. Preliminary discussion and needs analysis:
    Recording of the status quo to determine the goal and scope of the penetration test, according to your situation and risk profile.
  2. Information gathering:
    Gathering all information relevant to the attack and viewing the company from an attacker's perspective.
  3. Identification of vulnerabilities:
    Detection of potential vulnerabilities through targeted automatic and manual tests. In doing so, we apply similar methods that criminal hackers also use.
  4. Exploitation of security vulnerabilities:
    Detection of vulnerabilities by our testers deliberately exploiting security vulnerabilities and attempting to access protected company data, such as customer data.
  5. Reporting
    Summary of the penetration test results and all vulnerabilities found as well as recommendations for action to remedy them.

In the financial sector as well as in the automotive industry, penetration tests are already part of regulatory requirements. It is to be expected that other industries will follow because, regardless of the industry sector and the size of the company, sensitive data must be protected. We therefore recommend that you regularly check the security of your IT assets.

Trust our expertise in the field of penetration testing

Our penetration testing services are applicable to many areas of IT infrastructure. These include applications, networks and infrastructures, embedded systems, online stores, the intranet, IoT devices, and self-programmed software. Because we take a holistic view of IT security in your organization, we also offer testing that focuses on organizational, process, and human vulnerabilities rather than just technology. Tests with a focus that is not exclusively technical include phishing attacks, Red Team campaigns or technical security assessments.

The IT security of your company is what we care about. Therefore, with our cybersecurity testing services, we identify any kind of vulnerabilities and security vulnerabilities before others exploit them. In this way, we provide you with an objective overview of your deficiencies and subsequently support you with the appropriate recommendations for remediation. When it comes to cybersecurity audits, you can rely on our specialist and industry expertise, because testing is in our auditors' blood. We replace insecurity with security and help you protect your assets and the trust of your customers. TÜV Rheinland - tested with certainty.

FAQ - Learn more about penetration testing

Would you like to learn more about penetration testing? Our experts have answered the most important questions for you.

Show all Hide all

What testing methods are used in a penetration test?

Our methods for a penetration test are tailored to the maturity level of your IT security.

For companies with a low level of IT security maturity, our recommendation is to perform a vulnerability assessment, which will automatically reveal most of the known and automatically exploitable vulnerabilities in your systems.

If your company has an average IT security maturity level, our recommendation is to perform a penetration test on your systems. The penetration test uses manual and automated tests to identify and exploit vulnerabilities and security vulnerabilities. This gives our IT security experts a deeper insight into the vulnerability of your systems and networks.

If the maturity level of your IT security is appropriately high due to high-quality security systems and processes, our IT security experts conduct an Adversary Simulation (Red Team Campaign), which simulates a real targeted attack on your company. The results provide you with insights into your company's resilience against a cyber attack and provide answers to the following questions, among others:

  • Is my company capable of detecting a targeted attack?
  • Is my company able to respond appropriately to a cyber attack?
  • Is an attacker able to steal my important assets undetected?

Irrespective of the test methods mentioned, we recommend that a security assessment be carried out by our IT security experts. A security assessment uses structured interviews to identify vulnerabilities and security issues that cannot usually be uncovered using the classic methods of a penetration test.

What is tested during a penetration test?

A penetration test can be applied flexibly. The entire company network (internal and external) can be part of the test, but also only partial areas such as your online shop. Furthermore, (I)IoT devices, embedded systems and/or control units in automobiles can also be the focus of a penetration test.

We help you choose the right approach for your purpose. Contact us for an individual needs analysis.

Are web applications tested according to OWASP?

For a penetration test for a web application, e.g. your online shop, we proceed according to the OWASP (Open Web Application Security Project) Testing Guide and thus also cover the OWASP Top 10. The OWASP Top 10 provides information about the most frequently identified vulnerabilities in web applications.

Are CVSSv3 scores used?

While we generally use our own simplified Risk Rating, on request we can use the Common Vulnerability Scoring System (CVSS), which derives a criticality measure from the essential properties of a vulnerability. Of course, we can also provide the so-called CVSS vector in addition to the CVSSv3 score.

As a small/medium or large business, do I need protection from cyber-attacks and network attacks?

Yes, every company offers a worthwhile target for attackers. Particularly in the case of small and medium-sized businesses, hackers assume that there are fewer security and protection measures in place and therefore prefer to attack them.

Is a one-time penetration test sufficient?

A penetration test is always a snapshot. Both the attacks and the tested infrastructure or application evolve, so that the results of a test become less meaningful over time. Therefore, such tests should be performed regularly. It is not always necessary to test all aspects equally, but you can focus on the changes during a regular test. As a rule, however, a complete retest should be carried out after two years at the latest.

What are the benefits of penetration testing for my company?

More and more business processes are being digitized and systems interconnected. This digitalization creates opportunities for hackers to infiltrate your systems. A penetration test helps you identify potential entry points for attackers and close discovered vulnerabilities through appropriate measures. Penetration testing enables you to detect security gaps in your IT infrastructure before hackers do. This protects not only your assets but also your reputation and customer trust in your brand.

For which applications can penetration tests be carried out?

Penetration tests can be conducted on almost all digital systems. Our experts carry out a wide range of tests, e.g., on B2B portals, cloud applications, and embedded systems such as control units. The methodology and scope strongly depend on the company's cybersecurity maturity level. Internal and external penetration testing is often a good starting point for gaining insight into your systems' vulnerabilities.

Are there any preparations or prerequisites needed before performing a penetration test?

No elaborate planning is required. Only personnel resource planning is necessary so we can discuss your individual needs in advance. During the test, a point of contact should be available for questions.

The basic requirement is that our experts have access to the corporate network and the systems to be tested. Whether additional information or access is needed depends on the test type.

In a black box test, our experts only receive network-level access to the systems. In a white box test, full system access is required, along with detailed knowledge of components and their interactions. A good compromise is the gray box test, where non-administrative access is typically provided.

How is data protection ensured during testing?

We take data protection seriously and handle your data responsibly. If systems or databases containing personal data are tested, we recommend contractually regulating the handling of such data.

During the test, we may come into contact with personal data, e.g., if a vulnerability grants access to a database containing such information. Therefore, data protection is a fixed component of our penetration testing contracts.

Does the penetration test reliably find all vulnerabilities?

A penetration test cannot uncover every possible vulnerability. As with any test: the deeper and broader the test coverage, the higher the likelihood of discovering vulnerabilities. For comprehensive IT security, a holistic cybersecurity concept is essential. Penetration testing is a vital part of achieving this.

What happens if a vulnerability is found?

If we find critical vulnerabilities, we will contact you during the test. You will receive an initial technical assessment and recommendations for remediation. Implementing these measures is your responsibility.

Less critical issues are summarized in a report. After the test, we provide a report with recommended actions to address the identified vulnerabilities.

What follow-up costs could arise?

Fixing identified vulnerabilities is recommended. Costs vary depending on severity and required measures. Some fixes are minor, like changing a code value from 0 to 1. Others may require process changes, which are more time-consuming and costly. These decisions and implementations are not part of the test itself but we offer advisory support.

What are the risks of undetected vulnerabilities?

The consequences can be severe and vary greatly—from a single system failure to full production outages lasting several days. A search for "WannaCry" and "production outage" shows real-world examples. Each company must assess what data loss, manipulation, or system downtime could mean for them. Undiscovered vulnerabilities can lead to worst-case scenarios.

Is a certificate or seal issued after the test for communication or marketing?

A penetration test aims to uncover vulnerabilities—it is not a certification or proof of security. A report showing no issues does not imply the system is fully secure.

Why perform a penetration test if our IT department already handles security?

Penetration testing is a specialized skill requiring deep technical knowledge and training. Our staff is highly trained and focused solely on penetration testing.

Mixed-role approaches (e.g., internal staff doing pentests on the side) often yield unreliable results. That’s why we recommend using dedicated experts—like those at TÜV Rheinland.

Some companies have their own pentest teams, and we support them too. As external experts, we provide a neutral view and can often identify different vulnerabilities than internal testers who know the system too well.

Does a positive test result diminish the work of our IT department?

Vulnerabilities arise for many reasons and do not reflect poorly on IT performance. Even leading IT companies regularly find issues. What truly reflects IT quality is how test results are handled and addressed.

pdf IoT with Security 168 KB Download
pdf Red Team Engagements 209 KB Download
pdf Penetrationtest 581 KB Download

Security vulnerability in the Fortinet FortiExtender Application

Our Sustainability Initiatives

Nothing less than the future is at stake. Companies, institutions, public authorities and each and every one of us can play a positive role in shaping the path to tomorrow. We provide you with comprehensive support to ensure that you operate safely, sustainably and efficiently for many years to come.

Sustainable Infrastructure

Comprehensive approaches for the long-term protection of infrastructure

Learn more!

Sustainability Service Search

Test, evaluate, certify, and more: our sustainability services

Learn more!

Sustainability Strategy 2025

Find out how we work with you to protect the future

Learn more!

Contact

Contact us to request a non-binding offer

Contact us to request a non-binding offer

Get in contact with us!

This might also interest you

Advanced Persistent Threat

Active hacker protection with threat management

Effective threat management to protect against cyber crime.

discover more

Business Continuity Management System (BCMS)

Business continuity management systems | TÜV Rheinland

Safeguarding productivity with BCM, IT emergency management and crisis management.

discover more

ISMS According to ISO/IEC 27001

ISMS According to ISO/IEC 27001

Improve systematic control over your company’s information security.

discover more

Managed Security Services for your IT Safety

Managed security services – TÜV Rheinland

Place your IT security in good hands with our managed security services.

discover more

Last Visited Service Pages