Gain Visibility Over Your External Threats

Cybra offers a full suite of external penetration testing services in Australia.

What is an external pentest?

An external pentest is the ethical hacking of an organisation’s internet-facing networks and systems to identify security risks.

The test emulates an internet-based attacker and utilises current attack techniques and methods.

External pentest pricing

External pentests are typically cheaper in price compared to testing internal networks or applications, as there are generally fewer systems connected to the internet with a smaller attack surface.

Dangers of external pentests

All penetration testing has a chance of adversely affecting systems, but this is very rare. All systems and networks should have adequate bandwidth and system resources before commencing.

Benefits of external pentests

The assessment identifies security gaps and vulnerabilities in internet-facing systems so the customer can remediate them before they are exploited by a malicious actor.

What systems can be tested?

Any service connected to the internet can be tested, including but not limited to VPNs, email servers, firewalls, routers, web servers, and FTP servers.

Out of scope

Unless required by the customer, Denial of Service (DoS) is strictly out of scope for external penetration testing.


External testing is conducted by experienced security consultants using specialised software and tools remotely over the internet, simulating a malicious attacker who is attacking from the internet.

Types of external attacks

External pentests cover a range of cyber attacks such as:

  1. Authentication attacks (brute force, password spraying)
  2. Authorisation bypasses
  3. Account takeovers
  4. Information disclosures
  5. Vulnerability exploitation
Authenticated testing

Most external tests are conducted without test credentials (unauthenticated). In some cases, authentication might be required to test VPNs and applications.


Various open-source and commercial software and scripts are deployed during an external penetration test.

Some examples are vulnerability scanners, port scanners, brute force tools, exploitation frameworks, and protocol analyzers.


While firewalls and WAFs are effective and mitigating some risks of exposing systems to the internet, they can sometimes interfere with penetration testing results. For the best outcome, Cybra will request that we are added to the allow-list of any such devices.

Detection / Monitoring

While not required, it is recommended to have some level of system and security monitoring in place during a penetration test as this allows the customer to observe how their systems react to a simulated hack, providing valuable insights for the security team.

What is a pentest report?

After a penetration test, the observations, findings, results and recommendations are presented in a professional report hand-written by our experienced consultants.

Who is the report for?

The penetration test report is formulated in a way that it can be read by executives/board, managers and technical staff.

Compliance objectives

Penetration test reports can be used as supporting evidence for relevant compliance frameworks.

What’s in the report?

The penetration test report includes an executive summary, technical summary, technical findings, vulnerability details and recommendations on how to remediate all identified issues.

What format is the report in?

The penetration test report is securely delivered to you in PDF format.

The report is professionally laid out so its easy for customer to navigate through the report.

Retest reports

Cybra offers an optional service to retest any vulnerabilities identified after you have a chance to fix the issues. This is known as a retest and an updated report is provided to you showing all remediated and non-remediated issues.

More Penetration Testing Resources

Penetration Testing Australia
Learn the obvious and not so obvious benefits of modern Penetration Testing.
Penetration Test Australia | Sydney | Melbourne | Brisbane
A Complete Penetration Testing Guide for Businesses in Australia.

Book a free Cyber Security consultation today