Pentest or vulnerability scanning

If you need to have a pentest or vulnerability scan performed, we have many options to assist you. Getting a pentest/vulnerability scan done does not necessarily have to be a big investment, as long as it is adapted to your needs.

Our pentests and vulnerability scans are performed according to the OWASP model, which is an internationally recognized standard for IT security. You can read more about OWASP. HERE

If you need to have a pentest or vulnerability scan performed, you are very welcome to contact us at +45 535 27000 to learn more about pricing and options.

Vulnerability scanning

Vulnerability, is typically performed on servers that have access to the internet, such as a web server. In a standard vulnerability scan, the server is scanned for known vulnerabilities and a report is prepared with a description of the scan and any changes/improvements that can be made.

If you require ongoing automated scanning, we have a 'managed' setup where Leave a Mark ensures that the scanning is continuously updated as new vulnerabilities are discovered.

Our automated scans contain as a minimum the following:

  • Opsætning af kørsel af op til 3 IPer/domæner
  • Host/Domain response scanning
  • Port scanning
  • Header scanning (Clickjacking)
  • TLS/SSL scanning
  • DNS setting
  • Robots scanning
  • Changes since the last scan
  • Manual review of the report
  • Online access to reports (stored for 24 months for auditing purposes)
  • Report data is fully encrypted with strong encryption.
  • Updating the scanning system to address known vulnerabilities.

Fast pris for en kørsel for 3 IP/domæner           DKK 1950,- /pr måned ex moms




Before conducting a pentest, it is important to define the appropriate scope as a it can encompass everything from online servers to physical access within the company.

Et typisk eksempel på en Pentest kunne være at test mod de servere som man har fået foretaget en vulnerability scanning på, for at sikre at der ikke er sikkerhedshuller.

When performing a penetration test, we act as ethical hackers and attempt to gain unauthorized access to the company's systems using various methods such as brute force login, SQL injection, API bypass, phishing, and more. 

After completing a penetration test, a report is prepared detailing the discovered security vulnerabilities and suggestions for improvement.