Capability 02

Penetration Testing
& Assurance

Human-led adversarial testing, augmented by Korrosiv.AI — our in-house AI-native pen testing engine. We find what automated scanners miss and replicate the techniques of real threat actors, giving you a true picture of your exposure before an attacker does.

What's included
  • External & internal penetration testing
  • Web application security testing
  • Mobile application security testing
  • API security assessments
  • WiFi & wireless security testing
  • Red team engagements
  • Cloud configuration reviews
  • Assumed breach exercises
  • Technical security assurance
  • Vulnerability assessments
The challenge

Automated scanners find known problems. Attackers find the rest.

Vulnerability scanners are a starting point, not a finish line. Real-world attackers combine technical skill, creative thinking, and persistence to find paths through your environment that no tool would flag. A clean scan report is not the same as a secure organisation.

SALTT Tech's testing team approaches every engagement the way a motivated threat actor would — methodically, with business context in mind, and focused on what would actually cause you harm. Every finding comes with a risk-rated remediation plan your team can action.

External & Internal Penetration Testing

Network penetration testing from both external (internet-facing) and internal (assumed network access) perspectives. Identifies exploitable paths through your perimeter and internal environment.

Web Application Security Testing

Manual assessment of web applications against OWASP and industry standards, augmented by Korrosiv.AI — our AI-native testing engine that analyses 100% of responses and adapts payloads in real time.

Mobile Application Security Testing

Security assessment of iOS and Android applications against OWASP MASVS. Covers insecure data storage, certificate pinning bypass, authentication and session management, API communication security, binary protections, and business logic flaws — using both static and dynamic analysis techniques.

API Security Assessments

Targeted assessment of REST and GraphQL APIs, powered in part by Korrosiv.AI's purpose-built API testing capability. Identifies excessive data exposure, broken object-level authorisation, and injection flaws.

Red Team Engagements

Adversary simulation exercises that test your detection and response capability against realistic, multi-stage attack scenarios. Designed to challenge your blue team, not just find vulnerabilities.

WiFi & Wireless Security Testing

Assessment of wireless network infrastructure including rogue access point detection, WPA2/WPA3 configuration review, client isolation controls, captive portal security, and segmentation between corporate and guest networks. Identifies vulnerabilities that could allow unauthorised network access or data interception.

Cloud Configuration Reviews

Assessment of AWS, Azure, and GCP environments against security best practices and CIS benchmarks. Identifies misconfigured services, excessive permissions, and insecure architecture patterns.

Assumed Breach Exercises

Starting from a foothold inside your environment, we test what an attacker could access, escalate, and exfiltrate. Focuses on detection gaps and lateral movement paths.

Technical Security Assurance

Independent technical review of security controls, architecture decisions, and implementation quality. Used to validate that built systems meet their security design intent before go-live.

Vulnerability Assessments

Structured, scoped assessments that identify and risk-rate known vulnerabilities across your environment. Delivered with prioritised remediation guidance — not just a raw CVE list.

What you gain

  • A clear, risk-rated picture of your exploitable vulnerabilities
  • Remediation guidance prioritised by business impact — not just severity score
  • Evidence for board reporting, compliance requirements, and cyber insurance
  • Validated detection and response capability against realistic attack scenarios
  • Independent assurance that security controls are working as intended
  • A trusted testing partner who understands your environment over time
Related Insights

Resources from our team

Security 12 Apr 2026
Korrosiv.AI Is Changing Penetration Testing for Australian Organisations

Traditional penetration testing has a coverage problem. A typical web application assessment covers somewhere between 20 and 40 per cent of ...

Read article →
Security 12 Apr 2026
AI-Driven Penetration Testing: What It Means for Your Program

Penetration testing has not changed much in its fundamentals over the past two decades. A skilled consultant, a defined scope, a time-boxed ...

Read article →
Security 12 Apr 2026
What a Penetration Test Actually Tells You

Most organisations that commission a penetration test understand, broadly, what they are asking for: a skilled consultant to attempt to brea...

Read article →

Ready to get started?

Our team works across Australia. Every engagement is led by experienced practitioners — not offshore subcontractors.

Get in Touch