Brachyura Bombshell
Ethical Hacking
& Penetration Testing
Based in Central FL | Testing Worldwide


Safe, Non-Destructive Security Testing
Real World Threat Acting & Attack Simulations Performed by a Certified Professional
Healthcare | Meet HIPAA Compliance
Contact me about Risk Analysis today
Recognized by U.S. Department of Defense, Fulfilling CyberSecurity Directive 8570
Confidentiality
Only the Authorized entity(s) can view the information
Integrity
Data remains unchanged, keeping the original representation of the Data accurate
Availability
The Data is accessible to those Authorized at all times
What is Penetration Testing? (Pentesting)
Penetration Testing & Ethical Hacking is security focused testing of computer systems, networks, applications, & people. These tests are performed by security professionals following a methodology. Here at iCyber Attack!, I follow what is known as the Pentest Methodology, though other Methods exist as well.
I am an Ethical Hacker. I abide by local & national laws. I ALWAYS obtain written permission from Clients & any applicable Cloud Service Providers before Testing
Strategies
White Box Testing | Full Knowledge
- Full knowledge of Client’s Assets (Infrastructure, Network, & Systems)
- Any applicable support resources are given to Pentester
Grey Box Testing | Partial Knowledge
- Some knowledge of the Client’s Assets
- Good for simulating an insider attack
Black Box Testing | No Knowledge
- No prior knowledge of the Client’s Assets
- Simulates Attack from the outsider’s perspective
Methodology

Plan & Scope
Planning starts a discussion with the Client to understand their Needs, Objectives, Budget & Rules of Engagement. This will escalate Planning into Scoping to determine the Testing Strategy, Assessment Type, & any Resources required.

Vulnerability Identification
Utilizing the Plan & Scope, Reconnaissance begins. Open Source Intelligence (OSINT), Active Scanning, Enumeration and Packet Inspection are among the list of Sources used to Gather Information & Identify Vulnerabilities. My Toolkit is determined by the devised Plan & Scope.

Attack & Exploit
Based upon vulnerabilities found and the Scope of the assessment, Exploitation begins. All successful and non successful Attacks are logged. The log will be included as part of the end of test Report.

Report
I will provide a written report with an overall risk score to the entity. I will verbally navigate the entity through the results of the Pentest Report, explaining any technical details. This results in a clear understanding of the entity’s Risk Baseline, as well as provide the order of remediation for found vulnerabilities.

About Me

Web App Security Testing
OWASP Top 10:
Injection, Broken Auth, Sensitive Data Exposure, XML External Entities XXE, Broken Access Control, Security Misconfiguration, XSS, Insecure Deserialization, Components with Known Vulnerabilities, Insufficient Logging and Monitoring

Compliance Based Testing
HIPAA classified information needs to be encrypted in transit and at rest

Social Engineering
People are the #1 weakness when it comes to Cyber Security. Social Engineering / People Hacking, is a great way to find out who needs security awareness training & retraining

SQL Database Testing
SQL Injection is the top vulnerability found in web applications and can have some serious consequences

Safe Phishing Campaigns
Awareness for your Teams and Workforce. Safely audit staff security awareness through phishing emulations

WiFi Threat Analysis
Unfortunately many Wifi AP’s are vulnerable to MITM Attacks, Deauth, and snooping
Have you been hacked?
CRIME & CRIMINAL PROCEDURE
Hacking is covered under United States Code, Title 18, Chapter 47, Sections 1029 and 1030 (Crimes and Criminal Procedure)
§1029 | Fraud & related activity w/ access devices
● Prosecute those who knowingly and with intent to defraud, produce, use, or traffic in one or more counterfeit access devices.
● Access devices can be an application or hardware that is created specifically to generate any type of access credentials
§1030 | Fraud and related activity with computers
● Covers just about any computer or device connected to a network
● Mandates penalties for anyone who accesses a computer in an unauthorized manner or exceeds one’s access rights
● Can be used to prosecute employees using capability and accesses provided by their company to conduct fraudulent activity