Penetration Testing

A real world test of your security.

Aura_Penetration Testing_Image 1-min

Identifying vulnerabilities in your network and applications

If you want to give your end-to-end security posture a real workout, an ‘offensive’ security review is just the thing.

Conducting regular penetration tests by Aura's team of ethical hackers is imperative to help identify vulnerabilities in your network or applications, before they can be exploited by cyber-criminals.

Simulation exercises such as purple or red teaming & social engineering puts your business’ technology, people and processes to the ultimate test; and uses the very same techniques often used by cyber-criminals and hackers.

Once complete, you can apply the learnings to remediate any deficiencies; and ensure you are spending your budget where it counts. 

Aura_Penetration Testing_Image 2-min

Penetration Testing

In a rapidly evolving threat landscape, it’s imperative you have a thorough understanding of your IT infrastructure; and maintain a clear roadmap for improving its security posture. There are many reasons to undergo a network security assessment. Front-foot your security by conducting regular penetration tests to help identify vulnerabilities in your network or applications, before they can be exploited by attackers.  

Services Aura provides include: 


Network Boundary Review


Internal Network Review 


Web-Application Penetration Testing


Mobile Application  Penetration Testing


Remote Access Testing




Aura_Penetration Testing_Image 3-min

Purple Teaming

A Purple Team assessment is a collaborative engagement to improve your organisation's cyber security posture by using penetration testing approaches that simulate highly relevant adversary tactics, techniques and procedures (TTPs) to test your defensive controls. Aura’s Red Team penetration testers will work collaboratively with your Blue Team to run test scenarios and trigger detective controls, recommend improvements, then iterate to demonstrate effectiveness.   

Aura_Penetration Testing_Image 4-min

Social Engineering

Many cyber security breaches are not a result of a failure of technology, but rather exploiting human nature. Using social engineering, we test how susceptible your employees are to persuasive or deceitful manipulation – through social media, email or by phone.

This not only test your defences, it also provides valuable information on how to improve your security posture. For example, we can advise on any training that is required to plug potential holes in your security and ensure your staff know how to spot, and deal with, any potential threats.

Aura_Penetration Testing_Image 5-min

Red Teaming Cyber-Attack Simulations

An Aura Red Team exercise tests your physical, network and application security from a cyber-criminal's point of view. It also assesses how your employees respond and stand-up to a broad multi-layered attack from the Aura team - who throughout the exercise are thinking and acting like a real-life adversary. If you really want to give your business an end-to-end security posture real-life workout, then an Aura ‘offensive’ Red Team is ideal for you.

Trusted by NZ Businesses to keep them secure

In the real world, your security posture will be tested by malicious agents. We can do the same, but under controlled conditions. This is one of the best ways to understand your vulnerabilities, and prepare your business for the eventual attacks.
Frans Lategan
Principal Security Consultant
Aura’s security review and the resulting recommendations really helped us improve our IT security systems and procedures
Michael Potter
IT Manager, Kawasaki Motors Australia
Since doing Aura’s developer training, our team has approached coding from a far more real attack-and-defence perspective, giving the system the security and robustness we need.
Rod Drury
CEO, Xero
In my experience, Aura have been awesome! They know what they’re doing, are easy to work with, do a fantastic job at a great price and nothing is ever a problem.
Paula Keene
Applications Manager, FlyBuys NZ
Promo-AI Checklist-min

AI Usage policy checklist

Our AI Usage policy checklist can help you implement an effective governance structure so your use of these tools is both ethical and follows cyber security best practise.


Ready to chat to a  expert?

This is Horatiu, one of our friendly experts. Fill in your details and we’ll get in touch.