Why Wavenet pen testing is smarter than your average bear

14/05/24 Wavenet
Why Wavenet pen testing is smarter than your average bear placeholder thumbnail

When you think of the world of cyber and information security, what do you see? Is it a someone in a dark room, wearing a black hooded top, hunched over a computer with Matrix-style green code on the screen?

Or, is it an office cleaner, wheeling a trolley full of sprays and cloths around desks as they scout a business – or someone who appears to be a health and safety inspector sneaking onto workers' computers to gather sensitive information?

If you'd pictured the first scene, you're not alone. That's how the world at large tends to view cyber crime – and of course, much cyber crime is conducted by people sitting in front of computers.

But if you'd pictured the second, then you'd be looking beyond that to the real lengths such criminals go to when trying to hack into organisations. And you’d also be picturing one of the unexpected and unique ways we at Wavenet can help your own company protect itself from devastating and costly attacks on its data.

It's all part of our penetration testing service, and our Ethical Hacker and Principal Consultant, Rob Shapland explains more in this blog.

 

Pen Testing: a reminder of what it's about

Those of you who already work in IT will be more than familiar with the concept of pen testing. But for those of you who have the often tricky job of convincing colleagues outside of the IT department about the importance of information security, it's worth revisiting the concept – especially if you’re reading this with the view to sharing it on.

Short for 'penetration testing', pen testing is the practice of planning and running pre-approved mock attacks on an organisation to identify and exploit its vulnerabilities. As it’s usually offered by companies that work in IT, the term tends to be associated with cyber security and technology, but for Wavenet, it's much more than that.

“Pen testing is attempting to test the security of a system,” explains Rob. “It could be a company website, by running a suite of tests against that website – tests against that website that simulates the holes that a hacker would be looking for.

“Or it could be testing a company’s infrastructure – most companies will have a number of IP addresses that are pointed to the internet and you’d test those for potential vulnerabilities like out of date VPNs, or by attempting to get into the infrastructure through weak passwords.”

That, says Rob, is why pen testing tends to be viewed in terms of technology, rather than testing a company’s security more widely as we do at Wavenet. It’s also worth noting, adds Rob, that’s there’s a difference between pen testing and vulnerability scanning. 

“With pen testing, if you find a vulnerability you're supposed to attempt to exploit it with the client’s permission, and so for example, if we discover an out of date VPN that's got a known vulnerability, we’ll gain access to see if there are any further vulnerabilities.

“With vulnerability scanning, clients may not want to go any further than that as there can be concerns about things ‘breaking’. So in practice, a lot of pen testing now is glorified vulnerability scanning.”

 

To really test your organisation's security means going beyond technology

Clearly, so much pen testing – effectively, a form of ethical hacking – focuses on technology, so it makes sense that it so often conjures up images of people in darkened rooms looking at code. But to understand how pen testing can be so much more valuable than that – and why Wavenet’s approach is different – it’s worth thinking about the 2014 British blockbuster film, Paddington.

A children’s film is not the kind of thing you’ll often hear IT companies referring to in terms of your organisation’s security, but it’s relevant. In the film, the titular character and his adopted guardian, Mr Brown, sneaks into the Geographer’s Guild to locate and steal some archived records, having first done their homework about the place.

For their attack, Mr Brown himself is dressed as a female cleaner to get past a security guard, and – as is typical of Paddington – a hilarious disaster involving marmalade sandwiches ensues. Obviously, we we’re not going to clog up your systems with bread-based snacks, but Paddington and Mr Brown’s cunning plan is not a million miles away from Rob’s work.

“One of the things we do with our pen testing is red teaming,” explains Rob. “With our client’s prior approval, we’ll attempt to breach a company’s entire security rather than just focusing on one system.

“To give you an example: a supermarket client might want to test the security of its rewards points database. So our brief would be to break into it and obtain customer data from it. And that’s where we’ll have to adopt the mindset of a criminal.”

While Rob does not have a Peruvian bear to assist him, he does have a team of equally friendly experts who know how to get under the skin and into the heart of an organisation – and it starts with what’s called open source intelligence gathering.

“That’s basically a term for conducting research on the internet,” explains Rob. “So with our supermarket client, we’ll start looking at how many systems they have online – how many websites they have – where’s their head office – could we break into their head office – who works there and so on.”

“We’ll look at their social media – they tend to be run by marketing teams and often post company photos with revealing information, like employee details on lanyards, which we can then use to create our own employee lanyards. If they use online recruitment platforms, we can find out about vacancies in the IT department, what systems they want applicants to have experience using, and therefore potential vulnerabilities.”

When you think about it, says Rob, there’s an enormous amount of information you can find out about a company online. And then, at Wavenet, we’ll go further than that.

“We’ll look at employees with distinctive names and then find their own social media profiles. Have they posted any photos on their Instagram about work events? Are they going away with work and likely to use different systems? Have they recently stayed at a hotel that we could use for creating a phishing attack, where we pretend to be the hotel contacting them to say they’ve left behind some property and asking them to open up a “photo”. 

If this all sounds scary, it’s because it should sound scary. But it’s also because Rob and his team come from one of the first pen testing companies in the UK, so they have heaps of experience of putting themselves in the shoes of hackers.

“With ‘regular’ pen testing, you’re largely sticking to the technical side,” says Rob. “But with red teaming, you’re bringing the human side into it – the social engineering aspect. For us, it starts there.”

 

Planning the attack on your organisation

Next, having gathered their intelligence, Rob and colleagues will develop a custom plan of attack. They’ll decide whether they’re going to use a mock phishing attack, or make a phone call to convince an employee to hand over a password – including writing a script that’s tailor-made to the employee. Or even if they’re going to physically enter the organisation’s premises.

“Getting into a company’s offices involves scouting the location,” says Rob. “I’ll typically go there a week or two before the planned attack and observe the building – employees coming and going – what suppliers they have visiting – do they have people visiting to top up the vending machine and so on – and can I pose as one.

“Often I’ll just pretend to be an employee – I’ll even dress to match the workplace dress code – and tailgate a real employee. With a fake ID badge and a confident attitude, it’s not difficult to get past security at the front entrance, especially in big organisations where it’s impossible to know everyone.”

Depending on how you look at it, Rob’s work has revealed something about human nature that’s both reassuring and concerning.

“People are more trusting and helpful than often we realise,” says Rob. “Obviously, it’s lovely that we have a habit of things like holding doors open for people and assuming everyone’s operating in good faith – it would be a really cynical, cold world if we all thought otherwise. But from a security perspective, it does demonstrate why we so often say that people are a company’s greatest vulnerability. It’s sad fact of life, but it’s true.”

Having scoped everything needed to decide on the best course of action, Rob and his team can then proceed to the attack, before reporting back all the findings to the client.

Attacking your organisation

Long before the attack itself, Rob and his team would have agreed with the client a brief – the intended goal of the pen testing. So when reporting back to the client, the focus is to answer the brief.

“One of my past briefs was to first get inside the company office,” says Rob. “From there I had to steal some paperwork, then get into their server room – one of the places in an office where the most sensitive data is stored.

“Then I had to plug a USB stick into one of their laptops to prove I could have put viruses on there, and the last one was to get onto an unattended computer to send an internal email to our client.”

Rob achieved all the objectives and notably, with such a set of goals, it’s not unusual for him to change the pretext throughout the whole attack. He might start out as an employee to get past reception, then change into a contractor once inside, then back to an employee. Again, this all hinges on good planning – and creating credible personas: for example, an outside contractor is not going to know their way round the office so might ask for directions, while an employee is going to be much more at ease walking around. Like Mr Brown with Paddington, Rob has to do a certain amount of acting, using scripts prepared ahead of the attack.

“If we don’t plan everything in great detail in advance and we’re caught out, it will be a waste of time and a waste of our client’s money,” says Rob. “So we have to get it right. We have to think outside the box to make sure we’re as believable as possible.

Rob continues, “And yes, that means thinking like a hacker – for Wavenet’s pen testing, we have a uniquely creative side.”

Reporting back to you

Once the attack is completed and all objectives fulfilled, Rob and his team get onto reporting back to you – and that will be a written document with all the findings. But again, going further to bring the human aspect into this is a key differentiator for Wavenet.

“We’ll present the report to staff,” says Rob. “It’s no point just handing over a document and saying ‘here, read that’. If you’ve gone to all the trouble to put yourself through our pen testing, it makes no sense to not discuss it face to face, so we can answer questions then and there. This helps reassure or enthuse staff who might be shocked at the findings, or still need further convincing about the importance of information security.”

Such presentations for clients invariably lead to staff training, so building a good relationship with all interested parties – whether inside or outside the IT department – is a key benefit of the sessions.

“We often wear hidden cameras during the attack,” explains Rob. “So in our presentation, we’ll show the footage and it’s not uncommon for staff to be gobsmacked. A written report doesn’t really elicit the same response – and yes, a little bit of shock like this can really help overhaul a company’s culture when it comes to information security.”

The other benefit of the face-to-face presentation is that it’s entirely tailored to the client. Rob and his team’s reports may follow a methodical format, but they’re anything but cookie cutter in their approach.

“When you show an employee how a phishing attack specifically targeted them,” says Rob, “it’s not something they can forget in a hurry. It can also in a way be upsetting, so it’s vital we’re there to say ‘look, it’s ok – we did this to make sure this doesn’t happen for real with devastating consequences.

“We pride ourselves on being constructive, uplifting and friendly – one way we do this is to not talk in technical jargon – so while the reporting back can raise eyebrows, we’re there to make sure there’s smiles on faces, too.”


Beyond Pen Testing

After planning, conducting and reporting on the attack, many clients sign up for Wavenet’s security training. And because it all stems from the attack, the training isn’t theoretical or abstract – so with Wavenet, the training is genuinely engaging and very much money well spent.

“I’ve done a lot of work in the media,” says Rob. “I see being a good communicator as vital to my role – and to all my team members – so I’d like to think we’re experienced in making what can be a dry subject interesting and memorable.

“Obviously, there’s a lot here that we absolutely can’t talk about in the public domain, but to get a general feel for how I and my colleagues work, you can Google my name  plus ‘ethical hacker’ and see some of our work in action.”

One such example is Rob’s work on the Channel 4 show, ‘Joe Lycett’s Got Your Back’, which you can see here.

And if you’d like to get the ball rolling with pen testing for your own organisation, you can get in touch with Rob and his team through our ‘contact us’ page, here. You won’t find a bunch of hackers in dark rooms – nor will you find any marmalade sandwiches – but you will find a team that’s both ingenious and affable.

Cyber Security, Penetration Testing, phishing

Latest blogs

See all posts
windows-11
Understanding Windows 10 Extended Security Updates (ESU) - what your business needs to know in 2026

As of 14 October 2025, Microsoft officially ended free security updates for Windows 10. Organisations that continue operating Windows 10 devices today - in 2026 - are now doing so in a post‑support environment, relying either on paid Extended Security Updates (ESU) or accepting increasing cyber risk. Windows updates are the backbone of endpoint security, identifying new vulnerabilities and closing them before attackers exploit them. Since the end of support deadline passed, unpatched vulnerabilities accumulate quickly, creating growing exposure across any estate still running Windows 10. Continuing with Windows 10 in 2026 can lead to: Higher cyber‑attack risk, particularly ransomware Compliance issues (Cyber Essentials, ISO 27001, GDPR, FCA/financial sector requirements) Reduced software compatibility with modern applications and security tools Increased helpdesk overhead due to outdated hardware and OS issues For organisations, this is no longer preparation for a future deadline - it’s about reducing risk now and completing the transition to a modern, supported operating system. Your organisation’s options in 2026 Businesses now have three strategic pathways depending on their hardware, budget cycle, and deployment readiness. 1. Upgrade existing compatible devices to Windows 11 If your current hardware meets Microsoft’s requirements, upgrading remains the fastest and most cost‑effective way to move away from Windows 10 ESU dependency. Benefits include: Ongoing security updates Modern protection (TPM 2.0, enhanced kernel security, improved identity protection) Support for AI‑powered features and future Microsoft roadmaps Lower risk and long‑term stability If your business has Windows 10 machines still capable of upgrading, this should be the first route explored. 2. Refresh your estate with Windows 11‑ready devices Many Windows 10 machines still in use in 2026 are now five to eight years old, and often: Fall below modern security standards Cause productivity bottlenecks Increase support tickets Consume disproportionate IT resources A structured hardware refresh offers: Predictable lifecycle management Improved reliability and performance Standardisation across departments Compatibility with modern security and MDM tooling Wavenet supports staged refresh programmes aligned with fiscal planning, ensuring minimal business disruption. 3. Continue using Windows 10 with Extended Security Updates (ESU) Microsoft’s Windows 10 ESU programme is still available, but it is: Paid per device, per year Increasing in cost each year (designed to encourage migration) Security‑only - no features or performance improvements A temporary safety net, not a long‑term strategy ESU is most appropriate when: Line‑of‑business applications are not yet Windows 11 certified You need additional time for a phased rollout Budget cycles are delaying upgrades or refresh Remote / operational environments require longer transition periods Most organisations still using ESU in 2026 should plan to exit it within the next 12–24 months. Assessing your Windows 11 readiness in 2026 At this stage, businesses need more than a simple device‑level compatibility check. A comprehensive analysis includes: Hardware readiness across the estate Application and vendor compatibility Driver and firmware validation Intune / MDM alignment Security baselines and policy impacts User profile and data considerations Deployment sequencing and pilot planning Wavenet offers full readiness assessments to provide a clear view of which devices can be upgraded, which require replacement, and where ESU may remain temporarily necessary. Why 2026 is a critical year for migration With the end of support now behind us, delaying migration further increases: Security exposure Operational risk Compliance penalties ESU costs End‑user frustration from aging hardware A well‑structured migration programme delivers: A secure, modernised endpoint environment Lower long‑term support cost Improved employee experience Better alignment with Microsoft’s cloud and security roadmap Many organisations are now accelerating migration to remove the remaining Windows 10 footprint entirely. How Wavenet supports your Windows 11 journey Wavenet provides end‑to‑end Windows 11 migration services, including: Estate discovery & readiness assessment Hardware lifecycle planning and procurement Application compatibility testing Managed upgrade or Autopilot deployment Configuration, security baselines, and Intune alignment ESU planning (where absolutely necessary) Phased rollouts with minimal disruption Whether you’re upgrading compatible devices, refreshing your estate, or transitioning off ESU entirely, Wavenet ensures a smooth, secure, and controlled migration.

Read more