Previous All Posts Next

Penetration Testing Examples: Real-World Scenarios That Expose

Posted: March 5, 2026 to Cybersecurity.

What Penetration Testing Really Looks Like

Most businesses understand that penetration testing is important, but few understand what it actually involves. The term conjures images of hooded hackers in dark rooms, but professional penetration testing is a methodical, documented process that simulates real-world attacks to identify vulnerabilities before malicious actors exploit them.

In this article, we share real-world penetration testing examples — anonymized but based on actual engagements — to illustrate the types of vulnerabilities that professional pen testers find, how they exploit them, and what businesses can do to remediate them. Understanding these examples helps demystify the process and demonstrates why regular penetration testing is essential for any organization that takes security seriously.

At Petronella Technology Group, we have conducted penetration tests for organizations across healthcare, defense contracting, financial services, and technology. These examples reflect the patterns we see repeatedly in the field.

Example 1: The Unpatched VPN Gateway

The Scenario

A mid-sized professional services firm with 150 employees engaged PTG for an external penetration test. The firm had recently passed a compliance audit and believed their perimeter security was solid.

What We Found

During reconnaissance, our team identified a VPN concentrator running firmware that was three major versions behind the current release. This particular firmware version had a known critical vulnerability (CVSSv3 9.8) that allowed unauthenticated remote code execution. The vulnerability had been publicly disclosed for over 18 months, and exploit code was readily available.

The Exploitation

Using the publicly available exploit, our team gained administrative access to the VPN gateway within minutes. From there, we pivoted into the internal network, where we discovered flat network architecture with no segmentation. Within two hours, we had domain administrator credentials and access to file shares containing client financial data, employee records, and proprietary business documents.

The Lesson

Patch management is not optional. This organization had a compliance checklist that included "maintain current patches," but no one was actually verifying that patches were applied to all devices — especially network infrastructure devices like VPN gateways, firewalls, and switches. A single unpatched device was the entry point for a complete network compromise.

Remediation

  • Immediate firmware update on the VPN gateway
  • Implementation of automated vulnerability scanning for all network devices
  • Network segmentation to limit lateral movement
  • Privileged access management to protect domain admin credentials

Example 2: Social Engineering Through Phishing

The Scenario

A healthcare organization with 300 employees requested a combined technical and social engineering penetration test. The organization had implemented email filtering and recently completed security awareness training.

What We Found

Our team crafted a targeted phishing campaign impersonating the organization's electronic health records (EHR) vendor. The email informed recipients of a "critical security update" that required them to log in to verify their credentials. The phishing page was a pixel-perfect replica of the EHR login portal hosted on a look-alike domain.

The Results

Despite the organization's security awareness training, 23% of employees clicked the link, and 11% entered their credentials. Among those who submitted credentials, three were clinical staff with access to patient records, and one was an IT administrator with elevated privileges.

Using the IT administrator's credentials, our team accessed the organization's Active Directory, internal applications, and network file shares. We demonstrated the ability to access protected health information (PHI) for thousands of patients.

The Lesson

Security awareness training is necessary but insufficient on its own. Organizations need multiple layers of defense: email filtering, multi-factor authentication (MFA), conditional access policies, and anomalous login detection. The IT administrator account that was compromised did not have MFA enabled — a single control that would have prevented the entire attack chain from succeeding.

Remediation

  • Mandatory MFA for all accounts, especially privileged accounts
  • Enhanced email filtering with look-alike domain detection
  • Conditional access policies restricting logins from unusual locations
  • Ongoing phishing simulations (quarterly, not annual)
  • HIPAA security risk assessment update

Example 3: Misconfigured Cloud Permissions

The Scenario

A SaaS company with a cloud-native architecture on AWS engaged PTG for a cloud penetration test. The company was preparing for SOC 2 Type II certification and wanted to validate their cloud security controls.

What We Found

Through enumeration of the company's AWS environment, we discovered an S3 bucket with public read access that contained application logs. These logs included detailed error messages with database connection strings, API keys, and internal service URLs.

The Exploitation

Using the exposed database connection string, we connected to an RDS instance that was accessible from the internet (another misconfiguration). The database contained customer data, billing information, and application secrets. We also used the exposed API keys to access internal services that provided additional access paths into the production environment.

The Lesson

Cloud misconfigurations are the number one cause of cloud security breaches. Default settings, overly permissive IAM policies, and publicly accessible storage are endemic in cloud environments that were built quickly without security review. This company's developers had prioritized speed over security, and the accumulated technical debt created a critical exposure.

Remediation

  • Removal of public access from all S3 buckets
  • Rotation of all exposed credentials and API keys
  • Network isolation of the RDS instance within private subnets
  • Implementation of AWS Config rules to detect and alert on misconfigurations
  • CloudTrail logging and monitoring for all API activity

Example 4: Physical Security and Internal Network Access

The Scenario

A financial services firm requested a comprehensive penetration test that included physical security testing. The firm wanted to understand whether an attacker who gained physical access to their office could compromise their network.

What We Found

Our tester gained access to the building by tailgating an employee through a badge-controlled door during the morning rush. Once inside, the tester found an unoccupied conference room with an active Ethernet port. Plugging a small network device into the port provided full internal network access.

The Exploitation

The internal network had no network access control (NAC) — any device plugged into an Ethernet port received a valid IP address and full network access. From this position, our tester identified and exploited a vulnerability in an internal web application that provided access to customer account data and financial records.

The Lesson

Physical security is cybersecurity. Organizations that invest heavily in firewalls and endpoint protection but neglect physical access controls leave themselves vulnerable to low-tech attacks. Network access control, visitor management procedures, and security cameras are all part of a comprehensive security program.

Remediation

  • Implementation of 802.1X network access control
  • Disabling unused network ports
  • Enhanced visitor management and escort policies
  • Security camera coverage in common areas
  • Employee training on tailgating awareness

Example 5: Wireless Network Exploitation

The Scenario

A law firm engaged PTG for a wireless penetration test after a neighboring business reported suspicious network activity.

What We Found

The firm's guest wireless network and corporate wireless network shared the same physical access points but were supposed to be isolated through VLAN segmentation. Our testing revealed that the VLAN configuration was incomplete — traffic from the guest network could reach the corporate VLAN through a misconfigured switch port.

The Exploitation

By connecting to the open guest network from the parking lot, our team was able to reach internal systems that should have been isolated. This included a network-attached storage device containing client case files and a print server that logged all printed documents.

The Lesson

Wireless network segmentation must be verified, not assumed. Many organizations configure guest and corporate wireless networks but never validate that the segmentation is actually effective. Regular wireless penetration testing identifies these gaps before they are exploited.

Remediation

  • Corrected VLAN configuration on all switch ports
  • Implemented wireless intrusion detection
  • Moved sensitive file shares behind additional authentication
  • Quarterly wireless security assessments

Why Regular Penetration Testing Matters

These examples illustrate a critical truth: security is not a destination, it is a continuous process. Environments change, new systems are deployed, configurations drift, and new vulnerabilities are discovered. Regular penetration testing — at least annually, and after any significant infrastructure change — ensures that new vulnerabilities are identified and addressed before attackers find them.

Compliance frameworks including CMMC, HIPAA, PCI-DSS, and SOC 2 all require or strongly recommend regular penetration testing. But compliance is the floor, not the ceiling. Organizations that test regularly and remediate promptly are dramatically more resilient than those that test only when auditors require it.

Frequently Asked Questions

How often should my business conduct penetration testing?

At minimum, annually. However, you should also conduct penetration tests after major infrastructure changes (new applications, cloud migrations, office relocations), after security incidents, and as part of compliance audit preparation. High-risk environments may benefit from quarterly testing.

What is the difference between a vulnerability scan and a penetration test?

A vulnerability scan is an automated tool that identifies known vulnerabilities. A penetration test is a manual, expert-driven exercise that attempts to actually exploit vulnerabilities, chain them together, and demonstrate real-world impact. Vulnerability scans find potential problems; penetration tests prove which problems are actually exploitable and how far an attacker can get.

Will a penetration test disrupt my business operations?

Professional penetration tests are carefully scoped and controlled to minimize operational impact. Testing is typically conducted during agreed-upon windows, and testers coordinate closely with your team to avoid disrupting critical systems. At PTG, we maintain constant communication throughout the engagement and can pause testing immediately if any unexpected impact occurs.

What should I do with the penetration test report?

A penetration test report is only valuable if you act on its findings. Prioritize remediation of critical and high-severity findings immediately, address medium-severity findings within 30-90 days, and develop a plan for low-severity items. Schedule a retest after remediation to verify that fixes are effective. PTG provides remediation guidance and retesting as part of our penetration testing engagements.

Test Your Defenses Before Attackers Do

The organizations that suffer the worst breaches are the ones that assumed their security was adequate without testing it. Do not be that organization. Contact Petronella Technology Group to schedule a professional penetration test that will reveal your true security posture. Call 919-422-2607 or submit a request through our website.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now