PENTRA PLATFORM

Technique-Level Execution.
Validated Findings.
Measurable Security Posture.

PENTRA is a penetration testing and vulnerability management platform that executes MITRE ATT&CK techniques and OWASP test cases at the individual technique level. Every result is validated by a security engineer, every detection is marked by the Blue Team, and every finding is backed by proof of execution.

MITRE ATT&CK Network Domain
OWASP Web · Mobile · API
100% Scope Coverage Enforced
On-Premises No Cloud Connectivity Required

PENTRA can be used by internal security teams as a platform or delivered as a fully managed service by Reacts — using the same structured methodology, technique library, and evidence-based execution model.

Penetration testing generates findings. PENTRA turns them into evidence.

The Scope Problem

Most engagements cover what the engineer remembers to test. PENTRA enforces scope through its technique library and Open Points tracker — every technique in scope must be executed and validated before the engagement can close.

The Evidence Problem

A finding without proof is an opinion. Every PENTRA test case carries screenshot evidence for the pass and fail outcome — stored securely, embedded in reports, and traceable to the engineer who validated it.

The Detection Problem

Red teams execute. Blue teams guess. PENTRA gives the Blue Team a live portal showing what is being executed — so detection can be marked per technique, with evidence, in real time. The result is a measured Detection Rate, not an estimate.

From Finding to Confirmed Fix — Without Losing the Thread.

Most platforms track findings. PENTRA closes them — with the same rigor used to discover them.

Penetration testing produces findings. Findings require remediation. Remediation requires confirmation. PENTRA manages the complete lifecycle — from the moment a vulnerability is confirmed by the engineer to the moment a retest proves it no longer exists.

Step Who Acts What Happens
1EngineerTechnique executed, exploitability validated, severity assigned, evidence uploaded. Finding recorded in PENTRA.
2Blue Team / Needed Actions queueFinding appears immediately in the Blue Team Portal as a Needed Action — with technique reference, severity, affected object, and engineer evidence.
3Blue TeamDefense team applies the mitigation. Blue Team marks the finding as mitigated in their portal, with a mitigation note.
4EngineerPENTRA automatically notifies the engineer that the Blue Team has marked the finding as mitigated and that retest is ready.
5EngineerEngineer retests the specific technique against the patched environment using the same execution path. Result is recorded with new evidence.
6EngineerIf retest confirms the fix, the finding is marked resolved — with retest evidence attached. If the technique still succeeds, the finding is escalated back to the Blue Team with new evidence.
Every finding PENTRA discovers, PENTRA can confirm is fixed — under the same attack conditions that found it.

Four Domains. One Platform. One Methodology.

PENTRA applies the same structured execution model — technique selection, execution, validation, evidence, reporting — across every attack surface.

MITRE ATT&CK Aligned

Internal Network & Active Directory

Structured technique execution against the full MITRE ATT&CK kill chain.

Execute MITRE ATT&CK techniques across the complete tactic sequence — from Initial Access through Impact — against internal network infrastructure and Active Directory environments. Each technique is executed individually, validated by the engineer, and recorded with evidence.

  • Full MITRE ATT&CK tactic/technique library for internal network and AD assessments
  • Windows agent deployment with unique TLS certificates per agent
  • Technique-level execution with real-time output streaming via WebSocket
  • Attack path builder with diagram editor and per-step annotations
  • Security Score and Detection Rate computed per tactic in real time
  • Open Points tracker — engagement cannot close until all techniques are validated
Learn More →
OWASP Full Coverage

Web Application Penetration Testing

Structured web security testing against the complete OWASP testing guide.

Execute OWASP-aligned test cases against web applications — from authentication and session management through injection, business logic, and API security. Each test case is validated for exploitability and evidenced before the finding is recorded.

  • Full OWASP Web Application Testing Guide — test case library per category
  • Scoped technique selection per engagement
  • Engineer-validated findings with severity, affected object, and evidence
  • Attack path documentation for multi-step exploitation scenarios
  • On-demand PDF and Word report generation
Learn More →
OWASP Mobile Coverage

Mobile Application Penetration Testing

Structured mobile security testing for iOS and Android — against OWASP Mobile.

Apply the same structured execution model to iOS and Android application assessments. Each OWASP Mobile test case is executed by the engineer, findings are validated and evidenced, and professional mobile pentest reports are generated on demand.

  • Full OWASP Mobile Application Testing Guide — iOS and Android
  • Test case execution tracking per technique
  • Evidence gallery per finding
  • Open Points tracker for 100% scope coverage
  • On-demand mobile pentest PDF report
Learn More →
OWASP API Security

API Security Testing

Structured API security testing against OWASP API Security.

APIs represent one of the most consistently under-tested attack surfaces in enterprise environments. PENTRA's API module applies structured test case execution to REST, SOAP, and GraphQL endpoints — with engineer-validated findings, evidence per test case, and on-demand reporting.

  • Full OWASP API Security test case library
  • Test case-level finding tracking with severity ratings
  • Evidence gallery per finding
  • Open Points tracker for 100% scope coverage
  • On-demand API pentest PDF with preview mode
Learn More →

PT++: Purple Team Built Into the Platform

PENTRA's PT++ framework enables simultaneous red team execution and blue team detection validation — in the same engagement, in real time.

PT++ is not a separate product or add-on. It is the structured Purple Team methodology built into every PENTRA engagement. When a PT++ engagement is active, the Engineer Portal and Blue Team Portal run in parallel — red team executes techniques while the Blue Team Portal streams live execution data to defenders, who mark detection manually with evidence.

Capability What It Produces
Structured Technique ExecutionA complete execution record for every in-scope technique — who ran it, when, what the output was, and whether it was validated as exploitable.
Verified Security ScoreA Security Score computed per tactic from confirmed engineer findings — not scanner output. Tracks how well the environment resists each ATT&CK or OWASP category.
Measured Detection RateA Detection Rate computed per tactic from Blue Team manual markings — not inferred from tool logs. Tracks how effectively the SOC detects what the Red Team executes.
Enforced Scope Coverage100% coverage — enforced through the Open Points tracker. No technique can be missed without being explicitly marked Not Applicable.
Metric Definition Computed From
Security ScoreThe percentage of MITRE ATT&CK techniques or OWASP test cases that the environment successfully resisted.Engineer-confirmed findings per tactic — updated in real time
Detection RateThe percentage of executed techniques that the Blue Team manually marked as detected, with supporting evidence.Blue Team manual markings per tactic — updated in real time
Scope CoveragePercentage of in-scope techniques executed and validated. Reaches 100% only when all Open Points are cleared.Open Points tracker

Every Stakeholder Has a Portal Built for Them

PENTRA operates three independent, isolated portals. Each has its own authentication, permissions, and purpose. Sessions cannot cross portal boundaries.

Portal For Core Capabilities
Engineer PortalPentesters running the engagementMITRE ATT&CK / OWASP technique library, technique-level execution, evidence upload, attack path builder, finding records, on-demand report generation, agent management
Blue Team PortalDefenders and SOC analystsLive feed of executed techniques, manual detection marking with evidence upload, Detection Rate per tactic, mitigation tracking, Needed Actions queue, Blue Team detection report
Admin PortalPlatform and engagement administratorsProject configuration, user account management, agent provisioning and certificate management, technique library management, license management, system health monitoring

Architecture Designed for Controlled, Secure Testing

Every action in PENTRA is tracked, attributed, and recoverable. Deployed on-premises — your data never leaves your infrastructure.

C2 Server — Management Console

The central management layer where all projects, techniques, findings, and reports are managed. Engineers operate from the console: selecting techniques, reviewing execution output, recording findings, and generating reports. The C2 server hosts the Engineer, Blue Team, and Admin portals — and runs the Web, Mobile, API, and Purple testing modules directly.

Network Module Agent — Initial-Access Machine (Windows)

The Network module is the only module that requires an agent. Web, Mobile, API, and Purple modules run from the C2 server directly. The Network agent is deployed on a customer-provided Windows initial-access machine and issued a unique TLS certificate from the PENTRA internal CA — cryptographically identifying it to the C2 server.

  • Receives technique execution commands from the engineer console
  • Executes MITRE ATT&CK techniques against the internal network
  • Streams real-time output back to the engineer via WebSocket over TLS
  • Monitored for liveness — automatically flagged as offline if unreachable
Security Controls
All agent-to-server communication is TLS-encrypted Each agent has a unique certificate (CN: agentN.pentra.internal) Agents do not persist between engagements unless explicitly retained All execution output is logged in private, non-web-accessible storage Agent count enforced by license — no unauthorized deployments possible No cloud connectivity required — PENTRA is fully air-gappable
Engineer Consoleselects technique
C2 Serverroutes command via TLS — or executes directly for Web / Mobile / API / Purple
Network Agentexecutes ATT&CK technique against internal target (Network module only)
Real-time output streamed backWebSocket over TLS
Engineer validates resultexploitability confirmed, severity assigned
Finding recorded with evidence

PENTRA Security Lab

Your Environment Tested Against What Attackers Are Actually Using Today — Including what AI is helping them build.

The PENTRA Security Lab is a dedicated internal research function that continuously develops, validates, and integrates new attack content into the PENTRA platform. When your team runs an engagement, they are working from a technique library that reflects the current threat landscape — including attack payloads that did not exist six months ago.

What the Lab Produces Benefit to Your Team
New MITRE ATT&CK techniques and OWASP test casesYour technique library grows without any effort from your team
AI-generated attack payloads and bypass scriptsTests reflect attacker capabilities that evade conventional detection and signature-based defenses
Updated execution payloadsTests reflect current attacker tooling — not legacy implementations
APT group TTP mappingsTest specifically against the threat actors relevant to your industry
Detection use cases per new techniqueBlue Team and SOC receive actionable detection guidance alongside every new test case
Mitigation recommendationsEvery new technique comes with a remediation reference
Outsource your attack R&D. Your engineers test against what is current. The Security Lab ensures current means now — not last year.

Compare Security Controls Across Environments. In One Engagement.

Deploy multiple agents. Execute the same techniques. See which configurations hold — and which don't.

Most penetration tests answer a binary question: can an attacker get in? PENTRA enables a more precise question: which of our security control configurations actually stops this technique?

Scenario What It Answers
EDR policy validationWhich EDR configuration blocks this technique? Which lets it through?
OS hardening baseline comparisonDoes our CIS Level 1 baseline stop lateral movement techniques that Level 2 blocks?
Network segmentation validationCan an attacker pivot from VLAN A to VLAN B using these techniques — or does the segmentation hold?
Golden image security postureWhich of our candidate golden images has the lowest residual attack surface against our ATT&CK scope?
Security control procurementBefore deploying a new EDR or NGFW, validate its effectiveness against your specific technique scope — with evidence.
1
Define scope

Define the technique scope for the engagement

2
Deploy agents

Deploy PENTRA agents on each target environment — different machines, VMs, or network segments

3
Execute techniques

Execute the same technique set across all agents — simultaneously or sequentially

4
Validate outcomes

Engineer validates each outcome per agent

5
Comparative report

PENTRA generates a comparative report — Security Score per configuration, per tactic — showing exactly where each environment succeeded or failed

Validate Security Before Deployment — Not After.

Apply the same attack library you use in production to the environments you build before they get there.

PENTRA's attack library and technique-level execution automation can be applied at any stage of the development lifecycle. The same MITRE ATT&CK and OWASP techniques executed against production assets can be executed against staging environments, containerized build artifacts, or infrastructure-as-code deployments before they reach production.

Stage What PENTRA Validates
Pre-production environmentExecute the full OWASP test case set against the application before it is promoted to production. Find authentication flaws and injection surfaces before users can reach them.
Infrastructure deploymentValidate that a new server image or container configuration resists the ATT&CK techniques relevant to your environment — before it joins the production network.
Security control deploymentAfter deploying a new EDR, WAF, or network policy, run the relevant ATT&CK or OWASP techniques to confirm the control is effective — with engineer-validated evidence.
Patch validationAfter patching a known vulnerability, retest the specific technique that exploited it — confirming remediation under the same attack conditions, not just on paper.
Find it in staging. Fix it before deployment. Confirm it with evidence.

Aligned With Every Major Security Framework

Standard How PENTRA Aligns
MITRE ATT&CKFull tactic/technique library for network (internal and external) assessments. Every finding is mapped to the ATT&CK technique from the moment it is recorded.
OWASPFull test case coverage for Web Application, Mobile Application, and API security assessments.
NIST Cybersecurity FrameworkPentest findings are cross-referenced to NIST controls in generated reports.
PCI-DSSCompliance impact analysis per finding available in all reports.
ISO 27001Report findings are referenceable against ISO 27001 controls for audit use.

One Platform. Designed for the Full Security Organization.

CISO
Board-ready Security Scores, measured Detection Rates, compliance-mapped findings, and a measurable answer to "how secure are we — and what are we missing?" — backed by engineer-confirmed data, not tool estimates.
SOC Manager
A confirmed Detection Rate per MITRE ATT&CK tactic, a prioritized mitigation backlog tied to real execution results, and visibility into MTTD across engagement history.
Pentester / Red Team
A controlled execution environment, a continuously updated technique library from the PENTRA Security Lab, and on-demand report generation — so engineers focus on testing, not documentation.
CTO / CIO
Consolidated visibility across all penetration testing activity — replacing fragmented tools, spreadsheets, and delayed reports with real-time security posture data.

Industries We Serve

Financial Services

Banking, insurance, and fintech security testing with PCI-DSS compliance alignment and audit-ready reporting.

Healthcare

Security assessments for healthcare systems, patient data environments, and regulated infrastructure — with evidence-backed compliance documentation.

E-commerce & Retail

Payment system security testing with PCI-DSS scope coverage.

Manufacturing & Industrial

OT/ICS-adjacent network segmentation validation and internal network assessments for industrial environments.

Managed Security Services

MSPs and MSSPs delivering structured, evidence-backed penetration testing to their client base through PENTRA.

Enterprise Technology

Large-scale internal and external network assessments with continuous engagement cadence and trend reporting.

What Organizations Use PENTRA For

Use Case Description
SOC Detection ValidationExecute MITRE ATT&CK techniques in a controlled environment while the Blue Team tracks detection in real time. Identify exactly which techniques your detection stack misses — with evidence.
Continuous Security ValidationRun recurring structured engagements against an always-current technique library. Track Security Score and Detection Rate trends across quarters to validate security investment impact.
Compliance ReadinessUse PENTRA's audit-ready reports — with MITRE ATT&CK and OWASP-mapped findings and evidence per test case — to demonstrate control effectiveness to auditors and regulators.
PT++ Purple Team ExercisesRun coordinated purple team engagements where Red Team execution and Blue Team detection marking happen simultaneously. Produce a combined report with attack coverage, Detection Rate per tactic, and an open mitigation backlog.
Executive Security ReportingGenerate on-demand executive summaries with Security Scores, severity distributions, and Detection Rates — formatted for board-level risk decisions.
Multi-Client ConsultingDeliver consistent, evidence-backed engagements across multiple clients from a single platform. Provide clients with live portals and automated reports that differentiate your firm from document-only competitors.
Security Control ComparisonDeploy multiple PENTRA agents simultaneously across different golden images, VLAN segments, or security control configurations. Execute the same technique set across all targets in parallel and compare outcomes.
DevSecOps Security ValidationIntegrate PENTRA's attack library into your development pipeline to validate the security posture of assets before they reach production — find and fix security gaps before deployment, not after.

Available Globally — Deployed On-Premises

PENTRA is deployed on your infrastructure — your data never leaves your environment. Engagements are supported internationally, with remote delivery available across all regions.

Frequently Asked Questions

PENTRA is used to perform structured penetration testing and vulnerability validation using MITRE ATT&CK (network domain) and OWASP (web, mobile, and API) methodologies — with human validation, evidence-backed findings, and measurable security outcomes.
No. PENTRA structures the penetration testing process — enforcing methodology coverage, managing evidence collection, and automating reporting — while keeping human validation at the center of every finding. Engineers operate the platform; no finding is recorded without engineer confirmation.
Detection is measured through manual validation by the Blue Team — who mark each executed technique as Detected or Not Detected with supporting evidence. The platform computes a Detection Rate per MITRE ATT&CK tactic from these manual markings. This is the PT++ engagement model.
No. PENTRA is deployed on-premises. Licensing is machine-bound (BIOS-based). No data leaves your infrastructure.
MITRE ATT&CK for internal and external network security testing, and OWASP (Web Testing Guide, Mobile Application Security Testing Guide, API Security) for application security testing. Findings are cross-referenced to NIST, PCI-DSS, and ISO 27001 in all reports.
PT++ is PENTRA's Purple Team execution framework. It enables simultaneous Red Team execution and Blue Team detection validation within the same engagement. The Engineer Portal and Blue Team Portal run in parallel — the Red Team executes techniques while the Blue Team marks detection in real time, producing a validated Detection Rate per MITRE ATT&CK tactic.
PDF and Microsoft Word. Reports include executive summary, per-tactic Security Score and Detection Rate charts, evidence screenshots, and MITRE ATT&CK or OWASP mapping per finding.

Validate Your Security. Measure Your Detection. Prove Your Coverage.

Get a structured penetration testing engagement delivered on PENTRA — with evidence-backed findings, real-time scoring, and on-demand reports.