Banner Image

Skills

  • Ldap
  • Penetration Testing
  • Security
  • Security Consulting
  • Data Management
  • DNS
  • Ethical Hacking
  • Feature Writing
  • Firebird
  • Kerberos Protocol
  • Microsoft Access
  • Microsoft SQL Server
  • MySQL
  • Network Security Testing
  • Networking

Sign up or Log in to see more.

Services

  • Penetration Testing of Web Applications

    $25/hr Starting at $200 Ongoing

    Dedicated Resource

    The web application penetration testing service evaluates the security of web-based applications and their supporting APIs in alignment with the Penetration Testing Execution Standard (PTES) and the OWASP...

    Data ManagementEthical HackingFeature WritingFirebirdLdap
  • Penetration Testing of Networks

    $25/hr Starting at $200 Ongoing

    Dedicated Resource

    The network penetration testing service assesses the security of internal or external network environments in accordance with the Penetration Testing Execution Standard (PTES). The assessment evaluates...

    DNSKerberos ProtocolLdapNetwork Security TestingNetworking

About

Penetration Tester | Cybersecurity Researcher

Cybersecurity researcher acknowledged by U.S Department of Defense (among other notable companies like AT&T, Semrush, Smule etc) for disclosing a number of vulnerabilities on DoDs systems via Hackerone bug bounty platform.

For deliverables, professional reports are created, that will outline every vulnerability found, proofs-of-concept, and solutions on how to fix the discovered vulnerabilities. Each report not only meets but exceeds requirements for compliance auditors.

Core competency is performing black and gray box testing on live web applications/networks or lab environments. Familiar with all common attack vectors and mitigation techniques, as well as finding unknown to public exploits known as 0days in web applications. Even though most of the work is confidential sample vulnerability report can be provided.

Service Description

1)Web Application Penetration Testing aligned with OWASP Top 10 and PTES
2)Mobile Application Penetration Testing aligned with OWASP Top 10 and PTES
3)Network Penetration Testing aligned with PTES
4)Security Hardening and Configuration Review

Pentesting tools: BurpSuite Professional, OpenVAS, Nmap, Metasploit, Mimikatz, Impacket Framework , Nuclei, Custom Python scripts

Work Terms

I work up to 8 hours a day if needed for success of the project in given deadline.
Communication of your choosing.
Preferably hourly contracts.

Attachments (Click to Preview)