From the perspective of a person on the external network, it is looked for at which data and internal systems can be accessed through the open systems of a corporation. We also review security configurations to determine the corporation's overall risk rating and current security status. With this test, we simulate attackers trying to infiltrate the corporate network from the internet.