How well protected are you against cyber attacks?

Our penetration tests help to identify security vulnerabilities in your IT and OT environment, fix them and also meet regulatory requirements.

Penetration testing with Limes Security

Ransomware attacks, exploited security vulnerabilities or data breaches: the media outlets are increasingly reporting new cyber security incidents. Networked systems are becoming increasingly complex and the need for comprehensive security measures is growing. Are you aware of the potential attack surfaces in your company? Are your security controls adequate and what would happen if they failed?

A penetration test is a powerful tool for answering precisely these questions. By identifying vulnerabilities and developing remedial measures based on them, you get cyber-resilient systems, environments and products – and thus a decisive competitive advantage.

Expert
Know-how

Our experts for IT and OT security have many years of experience from industry and numerous projects. They know exactly what is important in a wide range of industries.

Customized security analyses

Limes Security does not deliver automated reports “off the shelf”. We analyze security individually tailored to your systems, threat situation and company goals.

Secure testing in critical environments

Our tests are designed in such a way that they do not disrupt operational processes. Thanks to years of experience in securing critical infrastructures, we know how to simulate attacks – with little to no risks to ongoing operations.

Clear results that help

Our reports are easy to understand, clearly prioritized and practically oriented. They offer specific recommendations for development, operation and management.

Expertise that goes beyond projects

At Limes Security, penetration testing means not only uncovering vulnerabilities, but always going one step further. Our experts are not only active in customer projects, but also compete in competitions such as the Austrian Cyber Security Challenge or international hackathons. This commitment shows: We are passionate about cyber security and apply this expertise directly to our customers’ projects.

Our penetration testing services

OT Penetration Testing

IoT Penetration Testing

Goals and benefits of a penetration test

Identify vulnerabilities

Our experts use real attack patterns to identify vulnerabilities

Prevent financial losses

Preventing financial losses by protecting the classic security pillars: confidentiality, integrity and availability

Provide orientation

What should be remedied, when and how? Documentation of identified weaknesses including assessment, description and recommendation of possible remedial measures

Compliance with regulations and standards

Penetration tests ensure compliance with regulations and standards

due diligence

Proof of due diligence towards all types of stakeholders

Reputation

Protection against reputational damage

Phases of a penetration test

At Limes Security, every penetration test begins with a detailed onboarding process in which organizational issues (non-disclosure agreements, secure data exchange, etc.) are discussed and clarified. During this process, as well as during the entire project, strict rules on data classification and data handling are followed, especially with regard to the need-to-know and least privilege principle of the information obtained in the project. Project-specific organizational and technical issues are discussed in a kick-off meeting.

The actual penetration test consists of the following assessment phases:

1

Collection of information

The main objective of the first assessment phase is to obtain all relevant information. It also includes identifying the attack surface of an object or environment and the applicable threats. It also serves to define a detailed plan for the actual assessment steps, taking into account the defined assessment objectives.
2

Vulnerability analysis

In this phase, vulnerabilities and errors in systems, components or processes are identified. These can be misused by attackers and have an impact on operations or the underlying data, in particular on its confidentiality, integrity and availability.

All relevant weaknesses are systematically identified through a balanced ratio of assessment breadth and depth, taking into account the allocated resources and applying a risk-based approach.

3

Evaluation

The assessment of vulnerabilities has two main functions. On the one hand, the quality of the results is checked by ensuring that the tools have been configured correctly and deliver complete and appropriate results. On the other hand, various vulnerabilities and information originating from several tools and techniques are placed in the same context, prioritized and evaluated. This enables an iterative process in which the information gathered can be relevant for the identification of further vulnerabilities.
4

Exploitation and post-exploitation

Exploitation and post-exploitation make it possible to demonstrate the impact of real attackers' activities, such as escalation of privileges, extraction of sensitive information or potential impact on critical business processes. As new attack opportunities may be identified during this phase, a further vulnerability analysis phase may be required, again indicating the iterative nature of the whole process.
5

Reporting

The assessment report contains a summary of the general risk situation of the environment and the most important results. It also includes a description of the environment under review. It also contains an explanation of the assessment methodology and work applied. Finally, the report contains a detailed list of findings and recommendations.

Not found what you were looking for?

Contact us and find out more about our customized services.

Standards that we use

Depending on the penetration testing type, recognized standards, frameworks and industry-specific vulnerability catalogs are used as a methodological basis. These include, among others

  • NIST SP 800-82 as a guideline for safeguarding industrial control systems (ICS)
  • ISA/IEC 62443 for the cyber security of industrial automation and control systems
  • NIST Cyber Security Framework (CSF) for the structured evaluation of security measures
  • ISO/IEC 27001 as a reference for information security management systems or
  • the OWASP Top 10 series for identifying typical security-critical vulnerabilities.

These reference works ensure that the tests are carried out in a systematic, risk-based and reproducible manner.

Limes Security News

Recently discovered vulnerabilities

Someone is typing on a notebook and apparently bypassing cyber security guidelines
Siemens Healthineers syngo.plaza – insecure password encryption vulnerabilityAdvisories

Siemens Healthineers syngo.plaza – insecure password encryption vulnerability

25. February 2026
Siemens Spectrum Power 4 – critical Vulnerabilities discovered in SCADA- and Energy Management SystemAdvisories

Siemens Spectrum Power 4 – critical Vulnerabilities discovered in SCADA- and Energy Management System

30. January 2026
Breaching the OT Perimeter: Authentication Bypass in Claroty Secure Remote Access (CVE-2025-54603)Advisories

Breaching the OT Perimeter: Authentication Bypass in Claroty Secure Remote Access (CVE-2025-54603)

14. October 2025

Frequently asked questions

Does a penetration test have a negative impact on the system being tested?

Usually not, but it cannot be completely ruled out. Therefore, penetration tests are ideally carried out in a non-productive but equivalent environment in order to completely minimize the risk of disruption. In practice, this is not always possible, but the Limes experts are used to working in productive environments. The remaining risks are mitigated by appropriate planning, a transparent approach and a focus on communication with the customer.

Does a penetration test prove that a system is secure?

What is the difference between a penetration test and a vulnerability scan?

When is the best time for a penetration test?

Defending what matters

The next cyberattack is coming! Are you prepared for this?

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.