Offensive Security

Infrastructure Pentest

Identify vulnerabilities in your network with service tiers that match your needs and budget.

Companies that trust BrownPipe

For your organization

Why assess your infrastructure

Your network is the foundation of every operation. Servers, services, integrations, and access controls must be protected against constantly evolving threats.

An infrastructure pentest reveals where your environment is exposed and what needs to be fixed. Organizations seek this service when they need to:

Discover exposures before an attacker does

Meet compliance requirements (PCI-DSS, ISO 27001, SOC 2, GDPR)

Validate security after network changes or cloud migrations

Test whether network segmentation actually works

Assess Active Directory security

Provide evidence of due diligence to clients, partners, or insurers

Service Tiers

How we work

We offer three infrastructure assessment tiers. The choice depends on your objective, budget, and the depth of analysis your organization requires.

Vulnerability Scanning

What it is

Automated assessment using industry-leading scanning tools. We run the scan against your environment and deliver the raw output generated by the tool, without filtering or additional analysis.

Who it is for

Organizations that need quick visibility into their environment, have an internal technical team to interpret raw results, or want a first diagnostic at a lower investment.

What we deliver

  • List of hosts and services identified on the network
  • Known vulnerabilities detected by the tool
  • Severity ratings according to the tool's standard
  • You choose which severity levels to receive: critical, high, medium, and/or low

How pricing works

Fixed fee for running the scan, plus a charge for each severity-level report included. You decide what you want to receive.

Important: Results are delivered as-is from the tool, without manual validation. This means they may contain false positives and information that requires technical interpretation.

Scanning with Expert Analysis

What it is

The same automated scan as the previous tier, but with a layer of human review. A BrownPipe specialist analyzes the results, removes noise and false positives, and delivers a report that makes sense for your context.

Who it is for

Organizations that need an actionable report without spending time filtering hundreds of irrelevant alerts. Ideal for those who want environment visibility with analytical quality but do not yet require manual exploitation.

What we deliver

  • Specialist-reviewed and contextualized report
  • Removal of false positives and irrelevant alerts
  • Severity ratings adjusted to your environment's reality
  • Document ready to be used by the technical team or presented to management

How pricing works

Scanning fee plus a charge for the expert analysis.

Key advantage

You get more accurate reports, reviewed by the BrownPipe team.

Recommended

Full Infrastructure Pentest

What it is

A comprehensive penetration test, conducted manually by the BrownPipe technical team. We identify vulnerabilities, exploit them in a controlled manner, verify lateral movement, and document exactly how exposed your environment is.

Who it is for

Organizations that need to know the real risk, not just a list of CVEs. Companies that require concrete proof of impact, want to test the effectiveness of security controls, or need to meet compliance requirements that demand pentesting (PCI-DSS, audits, client contracts).

How pricing works

Base price that includes a set number of hosts. Additional hosts are charged based on complexity level.

Key advantage

You do not just receive a report. You have a team of specialists by your side from start to finish, through to the validation that the issues have been resolved.

Full pentest

How the Full Pentest works

We start by defining the scope together with you: which networks, hosts, and services will be assessed, testing windows, emergency contacts, and rules of engagement.

Vulnerability identification combines automated scanning with manual analysis. We do not limit ourselves to what the tool reports: we investigate configurations, permissions, integrations, and behaviors that may pose a risk.

When we gain initial access, we verify expansion possibilities: escalate privileges, access other systems, and reach critical assets. The entire process is documented with evidence: screenshots, executed commands, and proofs of concept.

Talk to a specialist
1

Planning and scoping

We define together with you which networks, hosts, and services will be assessed, testing windows, emergency contacts, and rules of engagement.

2

Reconnaissance

Our team maps the environment's attack surface, identifying hosts, services, versions, and exposed configurations.

3

Vulnerability identification

We combine automated scanning with manual analysis. We do not limit ourselves to what the tool reports: we investigate configurations, permissions, integrations, and behaviors that may pose a risk.

4

Controlled exploitation

Each relevant vulnerability is verified and exploited in a controlled manner to validate whether it is actually exploitable and what its impact is in your context.

5

Lateral movement

When we gain initial access, we verify expansion possibilities: escalate privileges, access other systems, and reach critical assets.

6

Documentation

The entire process is recorded with evidence: screenshots, executed commands, proofs of concept. You see exactly what we did and what we achieved.

7

Report and recommendations

We deliver a complete technical report with vulnerabilities, contextualized severity ratings, and prioritized remediation recommendations.

8

Follow-up support

We remain available to answer questions during remediation.

9

Retest

After you fix the critical and high vulnerabilities, we retest to validate that the corrections were effective.

Standards

Methodologies and frameworks

Our tests follow internationally recognized methodologies, adapted to the reality of each environment.

The choice and combination of methodologies depends on the scope and objectives of the project. This ensures the test meets compliance requirements (PCI-DSS, ISO 27001, audits) while remaining relevant to your organization's specific context.

NIST SP 800-115

NIST technical guide for security testing of networks and systems

OSSTMM

Methodology focused on metrics and attack surface coverage

PTES

Standard that defines phases and deliverables for professional penetration testing

MITRE ATT&CK

Framework for mapping lateral movement and privilege escalation techniques in Active Directory

Comparison

Tier comparison

Scanning Scan + Analysis Full Pentest
Automated execution
Expert analysis -
False positive removal -
Manual exploitation - -
Proof of real impact - -
Lateral movement - -
Detailed technical report Basic Contextualized Comprehensive
Remediation recommendations Generic Adjusted Prioritized
Post-delivery support - -
Retest after remediation - -

Common questions

Frequently asked questions

What is an Infrastructure Pentest?

It is a penetration test that assesses an organization's networks, servers, devices, and services, both internet-facing and internal. Unlike an automated scan that only lists known CVEs, a pentest involves manual exploitation of vulnerabilities, real impact validation, and demonstration of complete attack paths. The result is a technical report showing exactly what an attacker could achieve in your environment, with evidence, risk classification, and clear remediation guidance.

What is the difference between a vulnerability scan and a pentest?

An automated scan lists known vulnerabilities using signatures. It delivers fast results but generates false positives and does not validate whether the flaws are actually exploitable. A pentest uses the scan as a starting point, but the work is manual: exploiting flaws, chaining attacks, and demonstrating what an attacker could actually achieve.

Which tier should I choose?

If you need quick visibility and have a technical team to interpret raw results, the Scanning tier fits. If you want a clean and actionable report, choose Scanning with Analysis. If you need to know the real risk, with exploitation and support through remediation, the Full Pentest is the right choice.

How long does each tier take?

Scanning: 1 to 3 business days. Scanning with Analysis: 3 to 7 business days. Full Pentest: 5 to 20 business days, depending on scope and complexity.

Can the test cause downtime?

We follow a controlled methodology. Denial-of-service (DoS) tests and potentially destructive exploits are only executed with explicit authorization and during agreed-upon windows. Most tests do not impact production.

Do you test Active Directory?

Yes. In the Scanning tier, we identify insecure configurations and known vulnerabilities. In the Full Pentest, we employ techniques such as Kerberoasting, AS-REP Roasting, DCSync, lateral movement, and map attack paths to Domain Admin.

Do you test cloud environments (AWS, Azure, GCP)?

Yes. We assess security configurations, IAM, storage, virtual networks, and integration with on-premises environments. The scope is defined in advance, respecting each provider's terms of use.

Does the Infrastructure Pentest meet PCI-DSS requirements?

Yes. PCI-DSS Requirement 11.3 mandates annual pentesting and testing after significant changes. Our tests follow methodologies accepted by the standard (NIST SP 800-115, OSSTMM, PTES), and the reports meet the documentation requirements demanded by auditors.

What is included in the retest?

After you remediate the vulnerabilities, we retest the critical and high findings to validate that the fixes were effective. The deadline to request the retest is defined in the proposal.

What happens if you find a critical vulnerability during the test?

We notify you immediately so that emergency measures can be taken. We do not wait for the final report to alert you about serious risks.

Fix vulnerabilities before they become a problem

Identifying and fixing vulnerabilities before an incident costs a fraction of the damage from a real breach. A well-executed pentest shows exactly where the risks are and how to prioritize them.

Get in touch

Contact

Address

Três de Maio - RS