Currently, after the gradual overcoming of the period of global health emergency, there is a considerable increase in threats to the information assets of organizations and companies, this trend is related to the actions adopted for epidemiological control of which isolation was the most booming. This measure generated in companies the need to carry out their activities by geographically disaggregating their workforces, making the continuity of daily work fall on technological means, through controlled access mechanisms to computer networks to meet the need to be concentrated in a single managed network. According to this behavior by the labor and productive sector characterized by the massive adoption of labor models such as teleworking and work at home (home office). The technological infrastructure was tested, concentrated in the means of remote access to information such as the use of VPNs, remote computer access software, dedicated channels, among others. However, with the adoption of these methods it is necessary to contemplate the threats that may be generated according to these operating models and the vulnerabilities that may be exploited by computer criminals. It is necessary to emphasize that for modern organizations the Information Security Systems implemented based on the model of ISO 27001 and the good practices for Information Security framed in ISO 27002 are no longer identified as a possibility of future investment, but, due to their importance in ensuring Business Continuity, Disaster recovery and daily operation are already considered as necessities for proper and viable operation. However, the context is different for most micro, small and medium-sized enterprises (MSMEs) since these organizations usually do not allocate resources to mitigate their technological risks. Based on the above, companies to close or mitigate vulnerabilities and begin to become preventive against active attacks; one of the first tasks focuses on carrying out GAP analysis accompanied by PENTEST in order to determine the current state of the organization, define strategies and mechanisms to counteract vulnerabilities and consider future risk. Therefore, the project proposal focuses on Preparation of a PENTEST technical report to a simulated virtual network through Packet Tracer