Security Insights
What to expect during a pentest?
By John
What to Expect During a Penetration Test
If you’ve never been through a penetration test before, the experience can feel opaque. What’s actually happening on your network? What do you need to provide? When will you hear from us?
The honest answer: most of the work happens before testing ever begins.
This is the second article in a short series on penetration testing. The first, What Is Penetration Testing?, covered the fundamentals — what a pentest is, why organizations commission them, and what to expect at a high level. This piece goes deeper into the engagement itself.
Preparation: The Phase Most People Underestimate
A penetration test doesn’t start when we launch our first probe. It starts weeks earlier, in the scoping and pre-engagement phase. This is where the quality of the engagement is largely determined.
Before any testing begins, we need a few things from you:
- Scope definition — what systems, applications, or infrastructure are in scope, and what’s explicitly off-limits
- Environment access — the network ranges, URLs, or application environments we’ll be testing
- Credentials — depending on the test type (black box, grey box, or white box), we’ll need accounts provisioned for our use
- Testing windows — some organizations have blackout periods or change freezes; we work around yours
- Emergency contacts — a named individual we can reach immediately if something unexpected surfaces during testing
This isn’t bureaucracy. It’s how we protect both sides. Every engagement at EliteSec begins with a signed NDA and a Statement of Work that defines scope precisely. We won’t start testing until that’s in place.
Once we have what we need, we ask one thing of you: let us work.
What Happens During the Engagement
For most clients, the active testing period is quiet — by design. Penetration testers work methodically and don’t need hand-holding once the engagement is underway.
You won’t hear much from us unless:
- We discover a critical finding that warrants immediate escalation
- We need clarification on something in scope
- You’ve requested regular status updates (we default to weekly check-ins if you want them)
One thing worth understanding: if your organization has active security monitoring or a SIEM in place, our activity will likely trigger alerts. This is expected. We provide the IP addresses of our testing machines upfront so your security team can attribute that activity to us, rather than triggering a full incident response.
This is also why communication during scoping matters. A well-defined engagement avoids confusion on both sides.
The Penetration Test Report: Where the Value Becomes Visible
When testing wraps, we deliver a written report and walk through findings in a debrief call. This is where the quality of your penetration testing provider becomes obvious.
A professional pentest report has to serve two distinct audiences at the same time:
Your technical team needs actionable detail — steps to reproduce each finding, severity ratings, and specific remediation guidance. Vague findings aren’t findings. They’re noise that costs your team time without reducing risk.
Your leadership, board, or enterprise clients need a report that communicates risk in plain language and demonstrates that a rigorous, independent security assessment was completed. If the report doesn’t hold up in the boardroom or in a vendor security review, the engagement didn’t deliver its full value.
If a firm hands you a report that fails either audience, they’ve failed the engagement — regardless of what they found.
For a closer look at how to evaluate whether a firm is worth hiring before you get to the report stage, How to Choose a Reputable Penetration Testing Firm walks through exactly that.
The Full Penetration Testing Process, End-to-End
- Scoping call — define objectives, test type, and constraints
- SOW and NDA signed — scope locked in writing before any work begins
- Pre-engagement checklist completed — credentials, IP ranges, contacts, testing windows confirmed
- Active testing — mostly quiet on your end; we escalate critical findings immediately
- Testing concludes — we compile and review all findings internally before delivery
- Report delivered — written findings for both technical and executive audiences
- Debrief call — walkthrough of results, questions answered, priorities discussed
- Remediation planning — next steps defined, retests scheduled as needed
Penetration testing is an exercise in trust and structured preparation. The engagement itself asks very little of you day-to-day. The debrief is where decisions get made.
How Often Should You Run a Penetration Test?
For most organizations, an annual penetration test is the baseline. But certain events should trigger an earlier assessment:
- A major product release or infrastructure change
- A new compliance requirement (SOC 2, ISO 27001, PCI DSS)
- A merger, acquisition, or significant headcount growth
- A customer or enterprise prospect requiring proof of third-party testing
If you’re a SaaS company navigating enterprise sales, the bar is higher than it used to be. We covered why in Why Third-Party Pen Testing Is Non-Negotiable for SaaS Firms.
Next in this series: How to Prepare for a Pentest — a practical checklist for the weeks leading up to an engagement, so your team is set up to get maximum value from the testing window. Coming next week.
If you have questions about what a penetration test would look like for your specific environment, book a call. No obligation — just a direct conversation about what you’re trying to accomplish and whether we’re the right fit.