Audit & Penetration Testing
At Oxydian, we deliver comprehensive cybersecurity audits and penetration tests (pentests) to identify and remediate vulnerabilities in your systems before they can be exploited. Whether you’re an SMB, mid-market, or enterprise, our expertise ensures an accurate diagnosis and a concrete action plan.
What is an intrusive audit or pentest?
An intrusive audit is a proactive security assessment that uses controlled penetration testing to identify vulnerabilities and risks in a system, network, or application. Our experts simulate targeted attacks to uncover security weaknesses that could be exploited by malicious actors.
Objectives
We perform an in‑depth review of your information systems to uncover vulnerabilities—technical, organizational, and user-related. Using a rigorous methodology and realistic attack scenarios, we measure the potential impact of each weakness and prioritize risks. Every engagement is tailored to the real configuration and operation of your environment, providing fast, effective solutions to reduce threats and strengthen your security over the long term.
Audit types
Discover our main audit types, tailored to each environment and security level.
Internal audit
Web application audit
External audit
Architecture audit
Code audit
Configuration audit
Red team engagement
Physical intrusion test
Retest
Our audit and pentest methodology
Oxydian applies a proven approach inspired by international standards (OWASP, PTES, NIST).
1 – Planning
Define objectives and scope to align testing with your priorities.Define objectives and scope to align testing with your priorities.
2 – Reconnaissance
Asset mapping and information gathering to determine the attack surface.
3 – Discovery
Manual research and use of Oxydian’s in‑house tools to detect exploitable vulnerabilities.
4 – Exploitation
Controlled attack simulation to validate the existence and impact of findings and the resilience of targets.
5 – Reporting & action plan
Delivery of a detailed report covering activities performed, findings prioritized by severity, and tailored recommendations to improve security.
Assessment profiles
Depending on your needs, we offer three distinct testing profiles—from realistic attack conditions to full-access analysis.
Black box

The tester has no prior information, emulating an external attacker.
Gray box

The tester has limited information, representing a compromised account scenario.
White box

The tester has full knowledge (admin-level) to enable an in‑depth audit.
Our deliverables
Our audit reports are clear, detailed, and actionable—built for both technical teams and decision‑makers. They provide a complete view of your current cybersecurity posture, with concrete, tailored fixes to streamline remediation.
Typical contents (around 100 pages):
- Executive summary
- Remediation plan
- Compromise scenario
- Asset mapping
- Password analysis
- Vulnerability details and fixes
Frequently Asked Questions
To discover vulnerabilities before attackers do, meet regulatory requirements (HDS, ISO 27001, GDPR, etc.), and reassure customers and partners about the security of your systems.
From 3 days to 3 weeks, depending on your infrastructure size and the scope under review.
No. Our tests are designed to avoid production impact. Highly intrusive actions that could cause disruption are performed only with your prior approval or in a dedicated test environment.
Yes. Our experts can advise during remediation, perform a retest to validate fixes, and support your broader security improvements.
It depends on the chosen profile. In black box, we have no initial access. In gray box, access is limited. In white box, you provide comprehensive technical information.
Audit attestation
At the end of each engagement, we issue an official attestation confirming that an audit was performed on your information system.
This one‑page summary presents the main findings without disclosing sensitive data.
It is delivered via our secure exchange platform, signed electronically, and its authenticity can be verified at any time through a dedicated online portal.
Book a 30-minute meeting
Take advantage of an exclusive session with a cybersecurity expert to gain an external perspective on the protection of your information system. Together, we will identify your challenges, priorities, and the first steps for improvement.
In just 30 minutes, discover our methodology, deliverables, advanced analysis tools, and benefit from personalized advice from one of our experts.