Skip to main content
QuantLab Logo

Penetration Testing

We break in so someone else doesn't. Network, wireless, web app, and Active Directory pentests with a custom red team toolkit and MITRE ATT&CK-mapped reporting.

What we build — and what we break

Four engagement types cover most of what clients ask for. Internal network and Active Directory pentests, where we start on a corporate VLAN with low-privilege credentials and see how far we can go. External perimeter and web application tests, where we attack what the internet sees. Wireless assessments against corporate Wi-Fi, guest networks, and BYOD separation. And full red team engagements where the blue team is unaware and we have to get in, establish persistence, and simulate data exfiltration without getting caught.

The full attack chain is on the table: Kerberoasting and AS-REP roasting, password spraying with rate-limit evasion, lateral movement via WinRM, SMB, and RDP, Kerberos delegation abuse (unconstrained, constrained, RBCD), Active Directory Certificate Services exploitation across known ESC patterns, and credential dumping from LSASS, DPAPI, and SAM.

Our custom red team toolkit has 11 attack modules covering credential spraying, lateral movement, Kerberos abuse, ADCS exploitation, C2 infrastructure spin-up, and evasion. Every technique we use is mapped to a MITRE ATT&CK ID so your detection team knows what to look for.

Who this is for

Companies with compliance pressure (SOC 2, PCI DSS, HIPAA, CMMC) that require annual third-party pentesting. Businesses that have never had a real test done and want to know what an attacker would actually find. Security teams who need a second-opinion red team exercise to justify budget or validate new controls. Law firms, financial services, healthcare orgs, and SaaS companies holding customer data.

Small IT shops running Active Directory who suspect their GPOs and permissions have drifted over time — they usually have. And development teams that want a black-box or credentialed assessment of a production web application before shipping a major release.

Not for: compliance-only checkbox buyers who want a short PDF and a photo-op. If that's the goal, there are cheaper vendors. Our reports get used by actual security teams to fix actual problems.

Reference engagement

See our Active Directory pentest case study for the full attack chain from standard user to Domain Admin — Kerberoasting, ADCS abuse, and MITRE ATT&CK mapping included. Pentest engagements are served across Atlanta, Macon, Savannah, and Augusta, GA, plus remote work nationwide.

Web application penetration testing

Your web app probably passed a Burp scan. That does not mean it is safe. The exploits that get companies breached are almost always business-logic bugs, broken auth flows, and IDOR chains that scanners cannot see. A real web app pentest reads your app the way an attacker does — mapping roles, abusing tenant boundaries, breaking workflow state, and finding the path from "anonymous visitor" to "domain admin."

Coverage on every web app engagement: OWASP Top 10 (SQLi, XSS, SSRF, broken access control). Authentication and session — MFA bypass, session fixation, password reset abuse. Authorization — IDOR, horizontal and vertical privilege escalation, tenant isolation. Business logic — workflow tampering, race conditions, pricing manipulation. API security across REST and GraphQL — mass assignment, rate limiting, schema introspection. Client-side — DOM XSS, prototype pollution, source-map and bundle review.

Methodology is credentialed walkthrough first so we understand the intended workflows, then test as multiple personas — unauthenticated, low-privilege user, admin — and look for the cracks between. Manual exploitation, real payloads, real proof. Pre-launch testing on staging is ideal; pre-launch findings cost less to fix than post-launch ones.

MITRE ATT&CK-aligned assessments

For clients who have a SIEM, an EDR, a SOC (in-house or MSSP), or a cyber-insurance carrier asking pointed questions, we run engagements scoped explicitly to MITRE ATT&CK techniques. We pick the threat profile that matches your industry — FIN7 for retail, APT41 for tech, ransomware affiliates for everyone — then execute that group's documented TTPs against your environment. Every technique attempted is logged with timestamp, source, target, and detection outcome, producing an ATT&CK heatmap of what your defenses actually catch.

See the full MITRE ATT&CK assessment page for the standalone engagement format.

How we approach it

Scoping call first. We pin down the rules of engagement, the authorized IP ranges, the emergency contacts, and what's explicitly off-limits (production databases, executive workstations, whatever). Then we sign the statement of work. Nothing runs without written authorization — this is non-negotiable.

Engagement runs in phases. Reconnaissance and fingerprinting. Initial access attempts. Post-exploitation and lateral movement. Privilege escalation. Then we write up the narrative — not a CSV dump of CVEs, but the actual story of how a real attacker chains the findings into impact.

Reports get delivered with an executive summary for leadership, a technical narrative for engineers, an appendix mapping every finding to MITRE ATT&CK, and a prioritized remediation plan. We do a debrief call with your team. And we include a retest after fixes so you can close the loop properly.

Tech & tools

Custom red team toolkit (11 modules)
BloodHound / SharpHound
Impacket suite
Certipy (ADCS)
CrackMapExec / NetExec
Responder / ntlmrelayx
Burp Suite Pro
Cobalt Strike / Sliver C2
Nmap, Nuclei, custom tooling

We use the standard industry toolset for most things because it mirrors what real attackers use. Where off-the-shelf tools are too noisy or missing a technique, our in-house modules fill the gap — and that's what gives us clean evasion against well-tuned EDR.

What you get

  • A full written report: executive summary, technical narrative, evidence, and remediation
  • Every finding mapped to MITRE ATT&CK technique IDs for your detection team
  • Proof-of-compromise screenshots and command history for each critical issue
  • Prioritized remediation roadmap ordered by exploitability, not just CVSS
  • Debrief call with your security and engineering leads
  • Retest of critical findings after remediation (included in most scopes)
  • A clean letter of attestation for SOC 2, PCI, or compliance needs
  • An honest assessment — not padded findings to fill pages

FAQs

What's the difference between a vulnerability scan and a penetration test?

A vulnerability scan runs automated tools against your environment and hands you a list of potential issues, most of which are false positives or low severity. A penetration test is a human adversary trying to chain findings into actual impact — credential spraying leading to lateral movement leading to domain admin. We do the second kind.

How long does a pentest take?

A standard internal network or Active Directory pentest runs 1-2 weeks of active testing plus reporting. Web application tests vary by scope — a single app with standard authentication is usually 1 week. Full red team engagements with persistent C2 and physical components run longer.

Do you cause outages during testing?

Rarely, and never intentionally on production. Denial-of-service testing is its own scope and requires explicit authorization. Normal pentesting uses low-impact techniques, and we coordinate with your team on anything that could stress services.

What do I actually get at the end?

A written report with executive summary, full attack narrative, screenshot evidence for every critical finding, each issue mapped to MITRE ATT&CK technique IDs, and a remediation roadmap prioritized by exploitability rather than CVSS score alone. Plus a retest after you fix things.

Are you based in Atlanta or Georgia?

Yes, Georgia-based. We work with clients across the US, mostly remotely, but in-person engagements (physical red team, wireless walkthroughs, on-site social engineering) are straightforward to schedule for Atlanta and surrounding areas.

Penetration Testing — Where We Serve

Georgia-based offensive security team. Most engagements run remotely; on-site work (physical red team, wireless walkthroughs, on-site social engineering) is straightforward in Atlanta and the Southeast, and available in any of the metros below.

Find out what's actually there.

Book a scoping call. We'll walk through rules of engagement, environment, and pricing in one conversation.

Or talk to us directly: (770) 652-1282 · beltz@quantlabusa.dev