TCG Red Team · authorized engagements only

Find the holes before they do.

Authorized pentesting and offensive security assessments for small businesses in Indiana and remote nationwide. External and internal scope, web-app testing, infrastructure review, and social engineering with written consent. You get a report you can hand to your insurance carrier, your compliance team, or the next IT contractor — written in plain English with technical evidence attached.

Operated by Gary Amick · CompTIA Security+ · CCNA · Kali / Nmap / Burp / Wireshark workbench · signed scope, signed report, signed cleanup.

⚠ Authorization is mandatory. No engagement begins without a signed Rules of Engagement document defining IP ranges, hostnames, time windows, exclusions, and emergency-stop procedure. Anything outside that scope stays untouched.

What an engagement covers

Every engagement is scoped in writing before any tool runs. You sign the scope. I work the scope. Anything outside scope stays untouched. There is no exploration, no "while I was in there I noticed…" surprises — if I find a critical issue beyond scope, it goes in the out-of-scope appendix as a finding, not as live testing.

External

External / perimeter assessment

What an attacker on the internet sees. Port scan, service fingerprint, TLS posture, exposed admin panels, default credentials, public S3 buckets, GitHub-leaked secrets, employee email exposure check.

External details →
Web app

Web application testing

OWASP Top 10 walkthrough on customer-facing sites: injection, broken auth, exposed admin, IDOR, CSRF, XSS, file upload, business-logic abuse. Manual testing on top of Burp Suite, with proof-of-concept evidence preserved.

Web app details →
Internal

Internal / assumed-breach

Drop a small box on your LAN (with your permission) for an "assumed-breach" walk: lateral movement potential, password-spray exposure, SMB shares, AD misconfigurations, printer admin, IoT devices, camera access from unsegmented Wi-Fi.

Internal details →
Wireless

Wireless & rogue-AP review

Wi-Fi crypto strength (WPA2/WPA3), guest-network leakage, hidden SSIDs, rogue AP detection, EAP misconfigurations. Walk the building. Report includes signal heatmap of in-scope coverage.

Wireless details →
Phishing

Social engineering with consent

Optional and only with written authorization from the business owner: simulated phishing emails, vishing scripts, badge / tailgating attempt at a single physical entry. Captures click-through and credential-submission rates without ever capturing the actual credential.

Phishing details →
Cameras

Security-camera adversarial review

For businesses with existing camera systems: test default credentials, RTSP exposure, mobile-app authentication, NVR firmware CVEs, retention claims vs. reality. The same tests an attacker who wants to disable your cameras would run.

Camera review details →

Methodology & ethics

Every engagement runs the same loop. The deliverable is a report you actually understand — executive summary, technical findings ranked by severity, fix recommendations, evidence appendix. Nothing is dropped on you in jargon.

  1. 1

    Scope & written authorization

    You and I sign a Rules of Engagement document defining IP ranges, hostnames, time windows, exclusions, and emergency-stop procedure. Nothing runs without it.

  2. 2

    Reconnaissance

    Open-source reconnaissance only at this stage. Public DNS, certificate transparency logs, leaked-credential databases, employee names from your public site. Nothing intrusive.

  3. 3

    Active testing

    Per the scope. Each finding is captured as it happens with timestamp, command, output, and severity. I don't pivot beyond scope without re-authorizing in writing.

  4. 4

    Verification & cleanup

    Every finding is verified twice. Anything I introduced (tools, accounts, persistence artifacts) is removed and the cleanup is documented. You get a signed cleanup attestation.

  5. 5

    Report & debrief

    Written report with executive summary (one page), technical findings (ranked, with fix steps), and evidence appendix. Live debrief call with your team to answer questions. You keep the report — it's yours, not licensed back to a portal.

Who this is for

Healthcare

Dental, orthodontics, family practice

HIPAA risk-assessment pentesting. Patient-data exposure paths. Workstation-locked-on-leave verification. Camera privacy zoning.

Professional

Law firms, accountants, real estate

Client-confidentiality-aware testing. File-server exposure. Document-management portals. Client-portal auth. Lost-laptop incident playbook validation.

Retail / SMB

Storefronts with POS + Wi-Fi

POS / cardholder-data segmentation. Guest-Wi-Fi leakage. Vendor-account hygiene. Pre-PCI-attestation gap analysis.

Multi-site

Franchises, multi-location operators

Same-test-every-site rollouts. Comparable scoring across locations. Findings rolled up to a multi-site dashboard for the operator.

What this is not

Pricing

Most small-business engagements are flat-priced after the scoping call. Hourly billing only when the scope is too open-ended to fix-price — and in that case I tell you up front.

From $1,200

External-only assessment

One internet-facing site or small range. Reconnaissance, web testing, perimeter posture. Report + debrief.

  • Single domain or /27 range
  • 1 week elapsed time
  • Executive + technical report
From $2,800

External + internal combined

Most-popular small-business package. External perimeter + assumed-breach internal walk.

  • External + internal scope
  • 2 weeks elapsed time
  • On-site visit included
  • Live remediation debrief
$95/hr

Hourly · 24/7 incident

Active compromise, ransomware, breach response. TCG Solutions' incident-response rate.

  • Phone answered 24/7
  • Containment first
  • Forensic imaging included
$0

Verified nonprofit

501(c)(3) within service area. Code TCG26FREE. Hardware not included.

  • External-only assessment
  • Report still yours
  • Reasonable scope