Network Penetration Testing
External and internal network testing targeting perimeter defences, Active Directory, segmentation controls and lateral movement paths. Full kill-chain assessment from initial access to objective completion.
Offensive Security
We find the gaps before adversaries do - then help you close them.
Penetration testing is an authorized simulated cyberattack against an organization's systems to identify exploitable vulnerabilities. Sherlock Forensics delivers network, application, cloud, AI/ML and red team penetration testing in Vancouver and across British Columbia, including LLM prompt injection testing and AI model security assessments, following PTES and OWASP methodologies.
Automated scanners find known vulnerabilities. Our testers find what scanners miss - business logic flaws, chained exploits and the attack paths that lead from initial access to domain compromise. Every engagement includes actionable remediation guidance and a retest to verify your fixes.
Capabilities
External and internal network testing targeting perimeter defences, Active Directory, segmentation controls and lateral movement paths. Full kill-chain assessment from initial access to objective completion.
OWASP Top 10 and beyond - authentication bypass, injection, authorization flaws, business logic vulnerabilities and API security testing for REST and GraphQL endpoints.
AWS, Azure and GCP security assessment targeting IAM misconfigurations, storage exposure, network controls, serverless vulnerabilities and container escape paths.
Objective-based adversary simulation with realistic TTPs mapped to MITRE ATT&CK. Tests your detection and response capabilities under conditions that mirror actual threat actors.
Phishing campaigns, vishing and physical security assessments to evaluate human-layer defences. Measures employee security awareness and organizational resilience.
LLM prompt injection testing, model extraction and inversion attacks, adversarial input fuzzing, inference endpoint abuse and AI API authentication testing. We assess ML pipelines, model serving infrastructure, training data stores and AI supply chains - the same attack surfaces threat actors are already targeting.
Engagement Types
| Approach | Knowledge Level | Best For |
|---|---|---|
| Black Box | No internal knowledge provided | External attacker simulation |
| Grey Box | Limited credentials, partial documentation | Insider threat, authenticated testing |
| White Box | Full access: source code, architecture, credentials | Comprehensive security assessment |
| Red Team | Objective-based, no rules of engagement constraints | Detection and response validation |
Frequently Asked Questions
Authority Resources
Our offensive security team holds recognized certifications.
Get Started
Order a penetration test online - no meetings required.
Order OnlineWhether you need a pre-funding pen test, compliance validation or a full red team engagement, we will scope an engagement that matches your risk profile and objectives.
Call 604.229.1994