services
Pentest
Pentesting (or intrusion testing) is an essential method for assessing the security of an information system. It comes in several forms, each tailored to specific needs:
internal, external, application-based, and physical.
Internal pentesting
External pentesting
Application pentesting
Physical intrusion testing
Wi-Fi pentesting

Internal pentesting
Internal pentesting involves simulating an attack within the organisation’s network, as if the attacker were a malicious employee or an intruder who already had access to the internal network. This type of assessment tests resistance to internal threats.
External pentesting
External pentesting, on the other hand, aims to assess the security of systems accessible from the outside, such as websites, servers, or cloud services. It simulates an attack by an external hacker attempting to penetrate the network.


Application pentesting
Application pentesting focuses on web, mobile, and software applications. It aims to detect vulnerabilities specific to these environments, such as SQL injections, XSS flaws, and authentication issues.
Physical intrusion testing
Finally, physical intrusion testing assesses the organisation’s physical security measures, such as building access, entry controls and the protection of sensitive equipment. It simulates scenarios involving industrial espionage or information theft.


Wi-Fi pentesting
A Wi-Fi pentest is a penetration test that assesses the security of an organisation’s wireless networks.
It identifies configuration weaknesses, encryption flaws and poor authentication practices.
- Experts simulate real attacks to verify whether an attacker could intercept traffic, break into the network or bypass controls.
- This type of audit includes analysis of access points, protocols used and connected devices.
- The aim is to strengthen Wi-Fi network protection and ensure data confidentiality.
At Soluss SA, quality and expertise are at the heart of our approach.
Our engineers continuously certify themselves in the latest attack techniques, ensuring that tests are always up to date with current threats. In this way, we help our clients protect their most valuable assets in the face of an ever-changing cyber threat landscape.
Let's fight together for your safety.