Protect your business network from attackers
Your external network is often the first route attackers use to reach internal systems and sensitive data. With an external network and cloud infrastructure pentest, DongIT identifies vulnerabilities and misconfigurations in a controlled manner, helping you reduce risk before issues can be exploited.
In practice, many organizations do not have full visibility into their online exposure. This can include forgotten (sub)domains, unused hosts, publicly accessible services, legacy environments, or configurations that were never cleaned up. These “hidden” assets expand the attack surface and can provide an entry point for attackers.
Our pentest provides clear insight into weaknesses across your external network and cloud environment, including concrete remediation recommendations and prioritized next steps. This enables you to take targeted action and measurably strengthen your security posture.
Focus of a Network & Cloud Pentest
A network pentest aims to provide a complete view of your external and internal network and the services connected to it. The goal is to identify vulnerabilities, misconfigurations, and unnecessary exposure that could lead to unauthorized access to your IT environment.
Depending on the scope, findings can also support an optional social engineering or phishing simulation. This helps assess how resilient employees are against manipulation that could result in network access.
This combined approach provides insight into both technical and human weaknesses. The results form a solid basis for targeted remediation and long-term strengthening of your network security.

Network security assessment approach
When analyzing your organization’s digital exposure, we assess how an attacker could approach your network. Our approach typically includes:
- Domain and IP identification
- Mapping domains, subdomains, and IP addresses that are directly or indirectly linked to your organization.
- Systems and services analysis
- Reviewing open ports, exposed services, outdated software, and insecure configurations.
- Attack path analysis
- Identifying likely external and internal attack paths, focusing on segmentation, access controls, and known weaknesses.
- Open Source Intelligence (OSINT)
- Analyzing publicly available information such as search engine indexing, leaked documents, metadata, forums, and social media.
What can you expect?
After completion, you will receive clear insights and practical recommendations, including:
- Visibility into vulnerabilities and weak points
- An overview of technical vulnerabilities across your network and cloud infrastructure.
- Overview of publicly accessible information
- Insight into information available through public sources that could be misused by attackers.
- Inventory of publicly exposed systems
- Identification of internet-facing systems, services, and configuration issues that increase risk.
- Host and server analysis
- Assessment of exposed hosts and servers, with concrete recommendations to restrict access or reconfigure securely.
Passive attack surface analysis
Using Open Source Intelligence (OSINT), we map internet-connected networks and services without directly interacting with your systems. By analyzing IP addresses, ASNs, and domains, we can uncover additional systems, services, and virtual hosts that are publicly accessible—each with its own risk profile.
Benefits of passive reconnaissance
- Low-noise: No active interaction that triggers defensive controls.
- Broader visibility: Helps uncover hidden hosts and exposure points.
- Preventive: Early identification of risks before exploitation.
On-site pentest for internal networks
For organizations that require deeper insight into their internal network, we provide an on-site pentest. An experienced security specialist assesses the internal infrastructure on location for vulnerabilities and misconfigurations.
This hands-on approach enables realistic attack scenarios to be tested and allows us to provide immediate, practical guidance on effective security measures.
Cloud infrastructure pentest
With the growing adoption of cloud platforms, a thorough security assessment of your cloud environment is essential. During a cloud infrastructure pentest, we assess environments such as AWS, Microsoft Azure, and Google Cloud Platform (GCP).
Our cloud pentests provide insight into misconfigurations, access risks, and compliance gaps, helping you reduce risk and maintain operational continuity in your cloud environment.
What do we test during a cloud infrastructure pentest?
- Cloud configuration: assessment of network, firewall, and security settings.
- Identity & Access Management (IAM): review of permissions, MFA, and privilege management.
- Data encryption: evaluation of encryption at rest and in transit.
- Logging & monitoring: assessment of detection and incident response capabilities.
- Resilience & recovery: review of backups, failover, and recovery procedures.
Nederlands