
Summary of available Pen Testing Services
Mancusomjm@gmail.com
512 948-2315
- Web Application Pen Testing – A focus on web applications is our primary goal as we will attempt to exploit vulnerabilities in web applications caused by security gaps of web application components.
- Cloud Platform Pen Testing – Cloud penetration testing is designed to assess the strengths and weaknesses of a cloud system and the application it hosts to improve its overall security posture. Cloud penetration testing helps to identify risks, vulnerabilities, and gaps. Impact of exploitable vulnerabilities.
- Source Code Scanning and Security Checks. Source code scanning and security checks involve the automated analysis of software source code to identify potential vulnerabilities and security weaknesses. Tools like OWASP Dependency-Check, RIPS, and TruffleHog security checks involve utilizing specialized tools and techniques to identify common security issues such as SQL injection, cross-site scripting (XSS), insecure authentication mechanisms, and sensitive data exposure. The goal of source code scanning and security checks is to proactively identify and address security vulnerabilities early in the development lifecycle, reducing the likelihood of exploitation and potential damage to systems and data.
My Background in The Industry
Five Years Experience conducting highly complex offensive security operations as a testing consistent with known adversary tactics techniques and procedures contributing to the developer team objectives and approaches taken to remediate risk.
– Provide guidance and recommendations to stakeholders responsible for security remediation actions to close identified gaps and remediation validation testing.
– Consult with defensive operations teams on adversary tactics to guide and mature cyber defensive countermeasures.
– Document security issues and impacts identified through offensive operations in a clear and concise manner to facilitate reporting to impacted stakeholders.