Blog

What Professional Penetration Testing Should Include in 2026

JP
subrosa Security Team
January 2026
Share

Organizations investing in penetration testing deserve clear understanding of what quality security testing entails. The cybersecurity market offers wide spectrum of testing services from automated vulnerability scanning to comprehensive manual penetration testing, each serving different purposes and delivering different value. Understanding these distinctions helps organizations select appropriate security testing matching their compliance requirements, risk tolerance, and budget constraints.

This comprehensive guide explains what professional penetration testing should include covering required tester qualifications, comprehensive testing methodology, expected deliverables, realistic pricing and effort estimates, differences from automated scanning, compliance considerations, and evaluation criteria helping organizations procure security testing that genuinely validates defenses through manual exploitation rather than automated vulnerability identification alone.

Understanding the Testing Spectrum

Two Distinct Services with Different Purposes

The security testing market includes two primary services often confused but serving different objectives:

Vulnerability Scanning: Automated identification of known security weaknesses using tools like Nessus, Qualys, or OpenVAS. Scanners compare system configurations against databases of published vulnerabilities identifying potential issues quickly and cost-effectively. Perfect for continuous monitoring and compliance scanning requirements.

Penetration Testing: Manual security assessment where certified professionals attempt to exploit vulnerabilities, bypass controls, and demonstrate real-world attack scenarios proving business impact. Combines automated scanning with extensive human expertise validating exploitability and testing defense effectiveness.

Both services provide value in comprehensive security programs. The key is understanding which service you're purchasing and ensuring it matches your actual needs and compliance requirements.

Key Differences: Scanning vs. Testing

Aspect Vulnerability Scanning Penetration Testing
Primary Goal Identify potential vulnerabilities Prove exploitability and business impact
Approach 100% automated tool-based Automated baseline + manual exploitation
Human Effort 4-8 hours (configuration + reporting) 60-120+ hours certified tester time
Exploitation None (identifies only) Active exploitation with validation
False Positives 15-30% typical <5% (manually eliminated)
Attack Chains Individual vulnerabilities Multi-step paths identified and exploited
Timeframe Hours to 1 day 1-3 weeks
Typical Cost $500-$5,000 $8,000-$40,000+
Best Use Continuous monitoring, patch validation Annual validation, compliance, pre-deployment
Compliance PCI DSS 11.2, quarterly scanning PCI DSS 11.3, annual penetration testing

What Professional Penetration Testing Includes

1. Certified Security Professionals

Quality penetration testing teams employ certified professionals with proven expertise. Look for these industry-recognized certifications:

OSCP
Offensive Security Certified Professional

24-hour hands-on exam requiring actual exploitation. Industry gold standard for penetration testing.

GPEN
GIAC Penetration Tester

Comprehensive methodology certification covering all testing phases and techniques.

GWAPT
GIAC Web App Penetration Tester

Specialized web application testing expertise for complex apps.

OSWE
Offensive Security Web Expert

Advanced web exploitation, source code review, and complex vulnerability analysis.

Beyond Certifications: Experience Matters

✓ 5-10+ years practical penetration testing experience
✓ Industry-specific knowledge (financial, healthcare, manufacturing)
✓ Published security research or CVE discoveries
✓ Portfolio of successful engagements with similar organizations

Professional providers transparently share tester qualifications, certifications, and experience enabling clients to verify expertise before engagement begins.

2. Comprehensive Testing Methodology

Quality penetration testing follows recognized frameworks including PTES (Penetration Testing Execution Standard), OWASP Testing Guide, and NIST SP 800-115.

1

Planning & Reconnaissance

8-20 hours
Detailed Scoping
Define in-scope systems and boundaries
OSINT Gathering
Domains, subdomains, employee info
Threat Modeling
Identify likely attack vectors
2

Discovery & Enumeration

8-16 hours
Vulnerability Scanning
Automated baseline assessment
Service Enumeration
SMB, LDAP, DNS, SNMP analysis
User Enumeration
Identify accounts and credentials
3

Vulnerability Analysis

8-16 hours
Manual Validation
Eliminate false positives
Exploitability Assessment
Evaluate each finding's risk
Attack Path Mapping
Identify compromise routes
4

Exploitation

24-60 hours
Manual Exploitation
Validate vulnerabilities exploitable
Authentication Bypass
Prove unauthorized access
Privilege Escalation
User → admin → domain admin
5

Post-Exploitation

12-24 hours
Lateral Movement
Spread across network segments
Credential Harvesting
Password dumps and analysis
Data Identification
Locate and access sensitive info
6

Reporting & Debrief

16-40 hours
Technical Report
Detailed findings and POCs
Executive Summary
Leadership-ready findings
Remediation Roadmap
Specific guidance and priorities

Total Professional Effort: 76-176 hours explaining realistic pricing of $10,000-$45,000 for comprehensive assessments.

Experience Professional Penetration Testing

subrosa provides comprehensive penetration testing with OSCP/GPEN certified professionals following industry-standard methodologies and delivering actionable findings with exploitation proof.

Learn About Our Approach

3. Proof-of-Concept Demonstrations

Professional penetration testing validates findings through exploitation evidence:

What Quality POCs Include:

Example POC: SQL Injection to Database Access

1. Discovered SQL injection in /search?query= parameter
2. Validated with time-based blind SQLi: ?query=test' AND SLEEP(5)--
3. Enumerated database: UNION SELECT table_name FROM information_schema.tables
4. Extracted admin credentials: UNION SELECT username,password FROM users
5. Result: Accessed 50,000 customer records including PII

Evidence: Screenshots of SQLMap output, database query results, customer table schema

Proof-of-concepts transform theoretical vulnerabilities into demonstrated business risks enabling informed remediation prioritization and stakeholder communication.

4. Comprehensive Reporting

Quality penetration testing delivers detailed, actionable reports tailored for different stakeholders:

Executive Summary

For Leadership and Board
Overall security posture, critical findings with business impact, attack scenarios readable by non-technical stakeholders, high-level recommendations, and comparison to previous assessments.

Technical Findings

For Security and IT Teams
Detailed vulnerability descriptions with CVE references, exploitation steps, proof-of-concept evidence, CVSS scores adjusted for your environment, and specific remediation guidance with configuration examples.

Attack Narratives

Real-World Exploitation Paths
Complete exploitation paths from initial access to data compromise, timeline showing hours/days required, lateral movement chains, privilege escalation techniques, and evidence of data accessed.

Remediation Roadmap

Prioritized Action Plan
Quick Wins: Immediate configuration changes
📅
Short-Term (1-30 days): Patching, authentication improvements
🏗️
Long-Term (30-90 days): Architecture changes, network segmentation

What Comprehensive Testing Validates

Attack Surface Coverage

Professional penetration testing comprehensively evaluates all attack vectors:

External Attack Surface

• Web applications and APIs
• VPN, mail servers, remote access
• Cloud misconfigurations
• DNS and subdomain security
• Third-party integrations

Internal Network

• Lateral movement paths
• Active Directory exploitation
• Network segmentation testing
• Privilege escalation routes
• Sensitive data access

Security Controls

EDR detection capabilities
SOC monitoring effectiveness
• MFA bypass testing
• Firewall rule validation
• Data loss prevention

Real-World Attack Simulation

Quality testing simulates actual attacker behaviors following the cyber kill chain:

1
Initial Access
Phishing simulation, exposed service exploitation, web application compromise
2
Persistence & Credential Theft
Maintain access, dump passwords, extract tokens, bypass MFA
3
Lateral Movement
Spread through network to reach critical systems and data
4
Data Exfiltration & Impact
Access sensitive data, quantify business damage in real terms

Understanding Realistic Pricing

Legitimate Penetration Testing Costs

SMALL SCOPE
$8K-15K
1-2 weeks
1-10 external IPs
1-2 web applications
60-80 hours effort
MOST POPULAR
$18K-32K
2-3 weeks
10-50 IPs
3-5 web applications
Internal network testing
100-140 hours effort
ENTERPRISE
$35K-65K
3-4 weeks
50-200 IPs
5+ web apps, APIs
Internal + wireless + social engineering
160-240 hours effort

Cost Components Explained

Understanding what you're paying for in professional penetration testing:

Senior Tester Time
40-80 hours per engagement
$100-150/hr
Mid-Level Tester
20-60 hours supporting
$75-125/hr
Technical Writer
16-32 hours report creation
$60-90/hr
QA Review
8-12 hours validation
$100-150/hr
Tools & Infrastructure
Commercial licenses, lab environments
Variable
Overhead
Management, insurance, business operations
15-25%
⚠️

Red Flag: Unrealistic Pricing

Pricing below $8,000 for network penetration testing typically indicates limited manual testing, offshore uncertified testers, or primarily automated scanning.

Transparent Penetration Testing Pricing

subrosa provides clear pricing reflecting actual certified tester effort with detailed scoping ensuring you understand exactly what's included and why it's priced appropriately.

Get Detailed Quote

Compliance Considerations

PCI DSS Requirements

REQUIREMENT 11.2

Vulnerability Scanning

✓ Quarterly internal/external scans
✓ ASV for external scans
Automated scanning satisfies requirement
REQUIREMENT 11.3

Penetration Testing

✓ Annual internal/external testing
✓ After infrastructure changes
✓ Network segmentation validation
✓ Manual exploitation required

PCI DSS v4.0 Clarifications

• Explicitly distinguishes penetration testing from vulnerability scanning
• Requires evidence testers attempted exploitation
• Mandates documented tester qualifications
• Expects methodology alignment with industry standards

Other Framework Requirements

SOC 2

Trust Service Criteria CC7.1

Requires detecting and responding to security incidents. Penetration testing validates detection capabilities. Auditors expect manual testing.
ISO 27001

Control A.12.6.1

Technical vulnerability management includes both scanning and testing. Testing validates vulnerability management effectiveness.
HIPAA

Security Rule §164.308(a)(8)

Periodic technical evaluation required. Penetration testing demonstrates ePHI protection and proves unauthorized access prevented.

Evaluating Penetration Testing Providers

Essential Questions to Ask

  1. "What certifications do your actual testers hold?"
    • Request specific certifications (OSCP, GPEN, GWAPT)
    • Ask for tester resumes and verification
    • Ensure certifications held by performing testers, not just company leadership
  2. "How many hours of manual testing are included?"
    • Quality testing includes 60-120+ hours
    • Breakdown by phase (recon, exploitation, reporting)
    • Distinguish automated scan time from manual effort
  3. "Will you provide proof-of-concept for findings?"
    • Screenshots of successful exploitation
    • Command outputs demonstrating compromise
    • Evidence of data or system access
  4. "Can I review a sample report?"
    • Request redacted report from similar engagement
    • Look for attack narratives, not just CVE lists
    • Verify specific remediation guidance included
  5. "What methodology do you follow?"
    • Should reference PTES, OWASP, or NIST SP 800-115
    • Documented approach ensuring consistency
    • Quality assurance and peer review process
  6. "What's included in post-testing support?"
    • Remediation validation testing
    • Technical support answering questions
    • Executive presentation to stakeholders
    • Audit support if compliance-driven

Portfolio and Reference Verification

When to Use Each Service

Vulnerability Scanning Ideal For:

Continuous Monitoring
Weekly/monthly security tracking
Patch Validation
Confirm updates deployed
Large-Scale Coverage
500-5,000+ assets efficiently
Compliance Scanning
PCI DSS quarterly requirements

Penetration Testing Essential For:

Annual Security Validation
Prove defenses work
Compliance Requirements
PCI DSS 11.3, SOC 2, HIPAA
Pre-Production Launch
Validate before customer use
Post-Incident Testing
M&A Due Diligence
Security assessment

Optimal Approach: Integrated Program

Leading organizations combine both services in comprehensive VAPT programs:

This integrated approach provides continuous visibility into emerging vulnerabilities through scanning while periodically validating exploitability through professional penetration testing, meeting both operational monitoring and compliance validation needs.

What to Expect: Professional Testing Timeline

Typical Engagement Flow

1-2
PRE-ENGAGEMENT
Planning & Authorization
Scoping discussion, SOW finalization, legal agreements, testing window scheduling
3
TESTING WEEK 1
Discovery & Enumeration
Reconnaissance, automated scanning, manual service enumeration, daily status updates
4
TESTING WEEK 2
Exploitation & Post-Exploitation
Manual exploitation attempts, lateral movement, critical finding notifications
5
REPORTING
Documentation & QA
Technical report writing, POC documentation, peer review
6
DELIVERY
Presentation & Support
Report delivery, debrief presentation, Q&A, remediation planning support

Total Timeline: 6 weeks from kickoff to final deliverables reflecting thorough, quality-focused approach.

Building Your Security Testing Program

Maturity Progression

STAGE 1

Foundation

$20K-35K

Baseline vulnerability assessment understanding current state, initial penetration test identifying critical gaps, and remediation of high and critical findings.

Year 1 Focus: Understand and fix critical risks
STAGE 2

Regular Cadence

$25K-50K

Quarterly vulnerability scanning, annual penetration testing, and remediation validation establishing regular security rhythm.

Year 2 Focus: Establish continuous validation
STAGE 3

Continuous Program

$40K-80K

Monthly vulnerability scanning, annual comprehensive testing, bi-annual focused assessments, and purple team exercises testing detection capabilities.

Year 3+ Focus: Mature security operations

Making the Right Investment

Organizations deserve clarity when purchasing security testing services. Understanding the distinction between automated vulnerability scanning and manual penetration testing enables informed decisions matching security needs, compliance requirements, and budget realities.

KEY TAKEAWAYS
Vulnerability scanning and penetration testing both provide value but serve different purposes
Professional penetration testing requires certified testers, manual exploitation, and comprehensive effort
Realistic pricing reflects 60-120+ hours of skilled security professional time
Compliance frameworks distinguish between scanning and testing with specific requirements
Quality testing includes proof-of-concepts demonstrating actual exploitability
Comprehensive security programs combine continuous scanning with annual penetration testing

When evaluating security testing providers, focus on qualifications, methodology, deliverables, and realistic effort estimates. Providers transparently explaining their approach, sharing tester credentials, and setting appropriate expectations deliver genuine security value helping organizations understand and address real risks.

subrosa provides both professional vulnerability management and comprehensive penetration testing with clear differentiation between services. Our vulnerability management includes continuous scanning, expert triage eliminating false positives, risk-based prioritization, and remediation guidance. Our penetration testing features OSCP and GPEN certified testers averaging 8+ years experience, 60-120 hours manual exploitation per engagement, comprehensive proof-of-concepts for all critical findings, detailed attack narratives demonstrating business impact, specific remediation roadmaps, and post-testing validation support. We help organizations understand appropriate testing for their specific needs, whether continuous scanning, annual penetration testing, or integrated programs combining both services. Our transparent approach educates clients ensuring security investment delivers actual risk reduction rather than just compliance documentation.

Get Professional Security Testing

Work with certified penetration testers delivering comprehensive manual exploitation, proof-of-concepts, and actionable findings matching your security and compliance needs.

Get Professional Penetration Testing
Certified testers with manual exploitation and comprehensive validation.
Book Now