Banner Image

Skills

  • Ethical Hacking
  • Mobile Security
  • Penetration Testing
  • Ajax
  • Analytics
  • Bootstrap
  • Cloud Computing
  • Data Security
  • Email Security
  • Firewalls
  • Information Technology
  • iptables
  • Laravel
  • Networking
  • Quality Assurance and Testing

Sign up or Log in to see more.

Services

  • Cyber Security

    $50/hr Starting at $100 Ongoing

    Dedicated Resource

    I will make a complete analysis of your web application to detect any type of security flaw that may affect the functioning of your system or put at risk the confidential information of your company,...

    AnalyticsEthical HackingMobile SecurityPenetration TestingQuality Assurance and Testing
  • Website Development

    $50/hr Starting at $100 Ongoing

    Dedicated Resource

    Characteristics Of A My Website Technology That Will be Used Bootstrap Framework Feel Free To talk To Me . I Will Guide You With 100% Honesty . Have A Very God Day :)

    AjaxBootstrapInformation TechnologyLaravelVue.js
  • Penetration Testing

    $18/hr Starting at $250 Ongoing

    Dedicated Resource

    My Interest Ranges from  Website Penetration Testing  Vendor Cloud Risk Assessment  Thick Client Security Assessment  Network External and Internal Penetration Testing  SOP  Writing Pentest Policy Selection...

    Cloud ComputingData SecurityEmail SecurityEthical HackingFirewalls

About

Penetration Tester

I am an expert in cybersecurity, certified CEH OSCP, specialties/ 6-years experience: Information security systems and networking security, information for any vulnerabilities with recommendation, pentesting

Work Terms

Network Pentest

External
Internal


Check List

Enumerate Services
Information Gathering
Find Insecure Service
Perform OS Detection
Perform Fingerprinting
Network Port Scanning
Identify Hosts and Footprint
Perform Vulnerability Scanning
Find insecure databases and components
Exploit Vulnerabilities (POC upon request)


Process of Execution

Setup

Documentation
Secure Permissions.
Test Execution

Ensure Network RDP Access
Firewall white Listing of Jump Server
Run the Tools
Vulnerability Analysis

Defining and classifying network
Reporting

Executive and Technical report
Remediation

The process of fixing the vulnerabilities.
Revalidation

The process of ensuring secure patch management