HDWSec
HDW Sec penetration testing illustration

Penetration Testing — Paris, France

Find your vulnerabilities before an attacker does.

Based in Paris, our team conducts penetration tests on your systems, applications and networks to reveal your vulnerabilities and deliver a clear, prioritised remediation plan.

Test types

From the internet

External penetration test

Conducted from our premises over a standard internet connection, this test assesses the resilience of your internet-facing infrastructure and services against an outside attacker. The objective is to determine whether a remote attacker can compromise your systems without prior access.

  • Web applications & API
  • Exposed network infrastructure
  • Cloud services
  • Authentication & remote access
From the local network

Internal penetration test

Conducted from the client's premises or via an implant deployed on their network, this test simulates an insider threat: malicious employee, phishing-compromised machine, maintenance agent or external consultant. The objective is to assess what an attacker with physical or network access can achieve.

  • Active Directory & internal network
  • Segmentation & lateral movement
  • Workstations & servers
  • Privilege escalation

Deliverables

What you receive

At the end of each engagement, you receive complete documentation enabling your technical and management teams to act with precision.

Executive report

Risk summary, overall criticality level and priority recommendations — designed for decision-makers.

Technical report

Full detail of each vulnerability: proof of exploitation, impact, attack scenario and remediation recommendation.

Debrief meeting

Closing meeting presenting findings, Q&A and a prioritised action plan with your teams.

Optional retest

Post-remediation verification of vulnerabilities to confirm the effectiveness of fixes implemented.

Industries

Sector-specific expertise for your business

Finance & Banking

Pentest for banking and fintech

Credit institutions, neobanks, payment platforms. Our tests cover DORA and PCI-DSS compliance across your sensitive financial applications and flows.

Healthcare

Pentest for healthcare providers

Healthcare data providers, hospitals, medical software vendors. Tests tailored to HDS certification requirements and patient data protection obligations.

SaaS & Tech

Pentest for SaaS and tech startups

Web apps, REST APIs, cloud infrastructure, CI/CD pipelines. We help software vendors validate their security posture ahead of each release.

Paris & France

On-site engagements across France

Our Paris-based team can travel on-site for internal network tests, Red Team missions or debrief sessions with your technical teams.

Frequently asked questions

What you need to know before starting

What is a penetration test?

A penetration test (pentest) is an authorised simulated cyberattack performed by cybersecurity experts. The goal is to identify exploitable vulnerabilities before a real attacker does, then provide a clear and prioritised remediation plan.

How long does a pentest take?

Duration depends on scope. A standard web application pentest typically takes 5 to 10 working days. A network infrastructure test is often scoped at 5 to 15 days. We define the appropriate duration together during the initial scoping phase.

What is the difference between black box, grey box and white box testing?

In black box testing, experts have no prior information about the target. In grey box — our default approach — test credentials and limited access are provided to maximise functional coverage. In white box, source code and full technical documentation are shared.

Do I need to notify my cloud provider before a pentest?

Yes, some providers (AWS, Azure, OVH…) require prior notification for security tests on their infrastructure. We guide you through this process systematically during the scoping phase.

How does a penetration test actually work?

An engagement is broken into four phases. First, scoping: defining the perimeter, rules of engagement and required accesses. Then reconnaissance and exploitation: our experts follow recognised methodologies — including the OWASP Top 10 for web applications — to map the attack surface, identify vulnerabilities and exploit them in a controlled manner. Next, report writing: an executive deliverable summarising the risks and a technical deliverable detailing each vulnerability with its CVSS severity score and remediation steps. Finally, an optional retest to verify that the fixes have been correctly applied.

Ready to assess your exposure?

Our experts define the scope with you and provide a tailored quote within 24 hours.