Penetration Testing in Mumbai · Scenario-led, BFSI-grade
OSCP/OSEP-led objective-based pentests for Mumbai BFSI, fintech and listed enterprises — beyond the annual VAPT scope.
How a Macksofy pentest engagement runs in Mumbai.
Mumbai BFSI clients increasingly draw a hard line between a CERT-In format annual VAPT (a regulator-driven scope) and a true penetration test (a scenario-led adversary engagement scoped against a defined business objective). Macksofy runs both — but the Mumbai penetration testing engagement is different in three concrete ways. First, the kickoff opens with a single objective written by the CISO and the audit-committee chair: 'reach the SWIFT gateway from a guest Wi-Fi position without SOC detection by D+10', or 'mint balance in a test customer's NEFT corridor without tripping the velocity engine'. Second, scope is asset-blind — we get the objective and the rules of engagement, not a fixed asset list. Third, the success metric is not a CVSS roll-up but whether the objective was met, by what path, in how many hours, with how many missed SOC alerts.
The Macksofy Mumbai bench is OSCP and OSEP-credentialed end-to-end. Senior leads carry OSCE3 or OSEP plus at least one CRTO / Red Team Ops II. We work the BKC corridor, Lower Parel, Powai, Andheri MIDC, Goregaon SEEPZ and the Navi Mumbai BCP belt at Airoli / Ghansoli / Vashi the same way: physical assessment legs included in scope where the objective demands it (badge-clone testing in the BKC tower lobby, Wi-Fi war-walking the Lower Parel rooftop, USB-drop on the Powai cafeteria floor). Most engagements include at least one onsite leg with the white-cell coordinator in the room.
Initial-access tradecraft on a Mumbai BFSI pentest typically lands on one of four vectors. Spear-phish against treasury and trade-finance functions is the highest-yield in our experience — the email lure is calibrated against BSE / NSE clearing-cycle news so the click rate is realistic for the audit committee. Watering-hole compromises against vendor-portal logins (Tata Communications, Sify, Tata Tele, Wipro DSP) are second. Physical access via tailgating a BKC tower lobby is third. Public-facing exploit chains — most often via a misconfigured Citrix NetScaler, Pulse Secure or Fortinet appliance — are the fourth lane. Every initial-access path is reproduced into a one-page narrative for the board pack with screenshot, timeline and the operator console reference for the SOC tabletop.
Post-exploitation on a Mumbai bank is a domain-and-identity exercise. ADCS misconfiguration paths (ESC1, ESC4, ESC8) are the single most common privileged-escalation vector across our 2025 engagement set. Kerberoasting against legacy mainframe-RACF integration accounts is the second most common. Constrained-delegation abuse and SCCM relay-to-domain-admin are third. We pull BloodHound paths against the AD forest backing core banking, then map the shortest unauthenticated edge to the SWIFT gateway, the OMS, the RBI WSS connection or the treasury-management system as the objective demands. SOC deconfliction runs through a private bridge — every escalation tagged so the SOC's regression hunt is not noise.
Detection-engineering is part of every Mumbai pentest deliverable, not a follow-on retainer. Every successful step in the kill chain is paired with the Sigma rule, the Splunk SPL or the Sentinel KQL that would have caught it, and a missed-alert reconciliation against the bank's SIEM. Most Mumbai engagements close with 6-12 fresh detection content items the SOC ships into production inside two weeks. For tier-1 private banks, a paired Macksofy detection-engineering analyst sits with the SOC for the closing week of the engagement.
Mumbai listed enterprises (pharma in Powai, FMCG in Andheri, listed manufacturing) buy penetration testing for a different reason — quarterly board-pack assurance and pre-IPO / pre-M&A diligence. The same playbook applies but the executive summary lands as a quarterly trend on the audit committee deck, not a one-off binder. Pharma and IT-services parent-company control catalogues (US BSA / FCPA / SOX overlays) get crosswalked into the report so the parent's IA function has no rework.
Procurement on a Mumbai pentest closes through the CISO and the audit-committee chair, with the General Counsel signing the rules-of-engagement letter for trespass-and-deception waivers, physical assessment indemnity and the safe-harbour clause that lets us touch production. Reports are encrypted, double-key delivered (Macksofy senior + CISO), and the master is destroyed inside 30 days of closure unless the bank requests retention. Mumbai counsel typically wants a Bombay High Court jurisdiction clause and an explicit no-data-exfiltration acknowledgement — both standard in our Mumbai engagement letter.
Onsite cadence is dictated by Mumbai geography (BKC walk-in same day, Andheri MIDC and Powai inside four hours, Navi Mumbai inside six hours) and the bank's BCP site location (Mahape, Airoli, Ghansoli for most clients). Engagement length is typically 4-6 weeks — 1 week reconnaissance, 2-3 weeks active exploitation, 1 week reporting and SOC tabletop. We do not run the standard 2-week 'pentest' that other Mumbai vendors brand under the same name — it does not give the SOC enough time to react and learn.
Five phases. Mumbai timeline.
Every Macksofy pentest engagement in Mumbai runs through the same phased protocol — adapted to Mumbai-specific procurement, regulator and delivery realities.
- CISO + audit-committee chair sign a single written objective (e.g. 'reach SWIFT without SOC detection by D+10')
- Rules-of-engagement letter — trespass-and-deception waiver, physical assessment indemnity, production safe-harbour, Bombay High Court jurisdiction
- SOC deconfliction bridge established on a private Signal/Teams channel with the bank's SOC lead
- White-cell sub-team identified (CISO + GC + audit-chair); operations team kept blind for realism
- OSINT against treasury, trade-finance, dealing-room and IT-vendor staff (LinkedIn, Refinitiv, Bloomberg footprints)
- Email lure calibrated to BSE / NSE clearing-cycle news for realistic spear-phish click rate
- Vendor-portal watering-hole and Citrix NetScaler / Pulse / Fortinet edge enumeration
- Physical leg — BKC / Lower Parel / Powai tower lobby tailgate or USB-drop where in scope
- ADCS ESC1 / ESC4 / ESC8 enumeration and exploitation with Certify + Certipy
- Kerberoasting legacy mainframe-RACF integration accounts and constrained-delegation abuse
- SCCM relay-to-domain-admin chain on the bank's software-distribution forest
- BloodHound shortest-path-to-objective mapping with manual abuse-case validation
- Shortest path to SWIFT / OMS / RBI WSS / treasury-management system per the signed objective
- Step-by-step operator console capture with timestamps for the post-engagement SOC tabletop
- Missed-alert reconciliation against the bank's SIEM at each kill-chain step
- Controlled-stop at the objective boundary — no data exfiltration; objective evidenced via screenshot + hash
- Joint SOC tabletop with the bank's blue-team walking each kill-chain step in operator-console order
- Sigma / Splunk SPL / Sentinel KQL content authored per missed alert — 6-12 production-ready rules per engagement
- Embedded Macksofy detection-engineering analyst with the SOC for the closing week
- Encrypted, double-key board-pack delivery to CISO + audit-committee chair; master destroyed at D+30 unless retention requested
Which Mumbai verticals we deliver Pentest for.
Private banks (Mumbai-HQ)
BKC corporate-office, Lower Parel treasury and Mahape BCP — objective-led pentest with SOC tabletop integration.
Stock brokers & MIIs
BKC / Lower Parel brokers — broker-terminal, OMS-to-exchange and Refinitiv/Bloomberg feed-handler objectives.
Payment aggregators
BKC PA-PG licensees — settlement, payout and reconciliation API objectives with RBI PA inspection-defence overlay.
Listed pharma & FMCG
Powai and Andheri MIDC HQs — quarterly board-pack pentest with US parent (SOX / FCPA) control-catalogue crosswalk.
Fintech (Series-C+)
BKC / Lower Parel fintechs — adversary emulation against fraud-stack and KYC-vendor integration objectives.
Insurance majors
Andheri / Worli insurer HQs — claims-fraud, PAS and KYC-impersonation objectives with IRDAI 2023 overlay.
The Mumbai deliverable pack.
Every Mumbai pentest engagement closes with the pack below — regulator-ready evidence, technical detail and board-readable summaries.
- Objective verdict (met / partially met / not met) with timestamped operator-console replay
- Kill-chain narrative as a one-page board-pack entry per phase with screenshot + timeline
- 6-12 production-ready SIEM detection rules (Sigma / Splunk SPL / Sentinel KQL) per engagement
- Missed-alert reconciliation report mapped to the bank's current SIEM use-case catalogue
- ADCS / Kerberos / SCCM / AD-forest hardening playbook tailored to the bank's domain topology
- Jira / ServiceNow-importable findings CSV with severity, owner, ETA and CWE
- Encrypted double-key board-pack delivery to CISO + audit-committee chair
- Joint SOC tabletop session and follow-on retainer if requested
A Mumbai pentest case study.
Single-objective pentest — reach SWIFT-CSP-protected gateway from a guest Wi-Fi position by D+10 without SOC detection; 6-week engagement with one BKC and one Mahape onsite leg
Objective met at D+7 via ADCS ESC4 path off a misconfigured vendor-portal landing; 11 missed alerts mapped to SIEM use-case gaps; 9 paired Sigma rules adopted by the SOC inside two weeks; one constrained-delegation path closed pre-disclosure that would have allowed dealing-desk-to-treasury-management-system traversal.
Rated 4.9 ★ from 612 client reviews.
“We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.”
“The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.”
“Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.”
Questions Mumbai buyers ask before signing.
Other Macksofy engagements in Mumbai.
Same engagement, other Macksofy metros.
Get a fixed-price proposal in 48 hours.
Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.
- CERT-In Empanelled
- EC-Council ATC · CompTIA Authorized
- 20,000+ professionals trained
- India + UAE engagements
