OT Penetration Testing Services
Raxis OT penetration testing identifies exploitable vulnerabilities across SCADA, ICS, and industrial networks — without disrupting the operations that keep your business running.
Operational Technology Is Under Attack
What We Test in OT
OT Industries We Protect
OT security is not one-size-fits-all. Raxis brings sector-specific expertise to the industries where operational disruption carries the highest consequences.
How Raxis OT Penetration Testing Works
Compliance
OT Security Standards & Compliance
Raxis OT penetration testing supports compliance with the regulations and frameworks governing industrial control system security.
NERC CIP
Mandatory cybersecurity standards for the bulk electric system in North America
IEC 62443
International standard for industrial automation and control system security
NIST SP 800-82
Guide to operational technology security for industrial control systems
TSA Security Directives
Cybersecurity requirements for pipeline and surface transportation operators
HSE OG86
UK guidance for cyber security of industrial automation and control systems
CFATS
Chemical Facility Anti-Terrorism Standards for high-risk chemical facilities
API 1164
Pipeline SCADA security standard for the oil and gas industry
Why Raxis for OT Penetration Testing
Our engineers understand industrial protocols, control system architectures, and the operational realities of testing environments where availability is non-negotiable. This isn’t an IT pentest team dabbling in OT.

Availability-first methodology
Every test is coordinated with your operations team, scoped to protect critical processes, and executed with the caution that industrial environments demand. Raxis has never caused an unplanned outage during an OT engagement.
Full IT/OT boundary coverage
Most OT attacks originate in IT. Raxis tests the entire attack path — from enterprise network to control system — so you see the real risk, not just isolated OT findings.
Actionable reporting for OT realities
We know you can’t always patch a PLC on a running production line. Raxis provides compensating control recommendations alongside traditional remediation steps, so your team has options that work in the real world.
Raxis Hack Stories
Our stories are based on real events encountered by Raxis engineers; however, some details have been altered or omitted to protect our customers’ identities.
How a Pentest Found a Hospital’s Radiation Machine on the Open Network
When a prominent medical entity engaged Raxis to assess the security of their internal network, they expected our team to call out the usual suspects: unpatched endpoints, response poisoning, maybe Kerberoasting a forgotten service account or two. What our team uncovered instead was a direct path from their production network to a control system managing one of the most tightly regulated pieces of equipment on their property, a linear accelerator.
The engagement started at the IT perimeter. The facility’s network was large and complex in the way large medical environments often are. Once inside the perimeter, Raxis identified a subnet that had a broader internal network space than the others. Using credential pairs harvested from an unprotected internal share, the Raxis team began mapping the environment. What our team found on the other side of that subnet stopped them in their tracks.
It wasn’t immediately apparent, but a few “help” commands typed into the terminal revealed that a control system associated with one of the hospital’s Linear Accelerators (LINACs) was reachable from the production network. No compensating controls. No jump host. No out-of-band access requirement or MFA. Just an open telnet connection to a system that, in the wrong hands, could manipulate the operational parameters of a machine designed to deliver ionizing radiation to a living patient. The Raxis team queried the device. It responded. When they checked the credentials, the system was configured exactly as it had left the factory floor.
Default username. Default password. Full access.
In a real attack scenario, this is the moment that potentially ends careers, triggers federal notifications, and makes news. A LINAC misconfigured to deliver the wrong dose, to the wrong field, or without the proper safety interlocks engaged isn’t a data breach; it’s a catastrophe waiting to happen. For this customer, it was an immediate escalation to their CISO and facilities leadership before continuing any further in that area of the environment.
This engagement was a stark reminder that OT risk doesn’t announce itself. It hides inside network diagrams that haven’t been updated, inside upgrade projects that didn’t include a security review, and inside the quiet assumption that critical systems are isolated because they’re supposed to be. Raxis OT penetration testing finds these assumptions before someone with bad intentions does.