Every engagement is scoped in writing before any tool runs. You sign the scope. I work the scope. Anything outside scope stays untouched. There is no exploration, no "while I was in there I noticed…" surprises — if I find a critical issue beyond scope, it goes in the out-of-scope appendix as a finding, not as live testing.
ExternalExternal / perimeter assessment
What an attacker on the internet sees. Port scan, service fingerprint, TLS posture, exposed admin panels, default credentials, public S3 buckets, GitHub-leaked secrets, employee email exposure check.
External details →
Web appWeb application testing
OWASP Top 10 walkthrough on customer-facing sites: injection, broken auth, exposed admin, IDOR, CSRF, XSS, file upload, business-logic abuse. Manual testing on top of Burp Suite, with proof-of-concept evidence preserved.
Web app details →
InternalInternal / assumed-breach
Drop a small box on your LAN (with your permission) for an "assumed-breach" walk: lateral movement potential, password-spray exposure, SMB shares, AD misconfigurations, printer admin, IoT devices, camera access from unsegmented Wi-Fi.
Internal details →
WirelessWireless & rogue-AP review
Wi-Fi crypto strength (WPA2/WPA3), guest-network leakage, hidden SSIDs, rogue AP detection, EAP misconfigurations. Walk the building. Report includes signal heatmap of in-scope coverage.
Wireless details →
PhishingSocial engineering with consent
Optional and only with written authorization from the business owner: simulated phishing emails, vishing scripts, badge / tailgating attempt at a single physical entry. Captures click-through and credential-submission rates without ever capturing the actual credential.
Phishing details →
CamerasSecurity-camera adversarial review
For businesses with existing camera systems: test default credentials, RTSP exposure, mobile-app authentication, NVR firmware CVEs, retention claims vs. reality. The same tests an attacker who wants to disable your cameras would run.
Camera review details →