Мы предоставим вам назначенный сайт, а вы поможете нам выполнить SQL-код сайта для доступа к базе данных пользователей сайта.
Работа через гарант xss.pro
Telegram: @GTYGAQ
Пожалуйста, обратите внимание, что пользователь заблокирован
Hello!
I am currently the Senior Supervisor of Offensive Cybersecurity and Penetration Testing at a fortune 500 company. I have been doing the Offensive/Red Team/Pen Testing part of Cybersecurity/InfoSec for 12 years now. I have been into computer and everything about them since I was about 10 years old. At my current position alone, which I have been at for 4 years now, I have lead and thoroughly conducted over 500 penetration tests of all kinds, from internal network testing, vulnerability scanning, cloud testing, web application testing, mobile (iOS & Android testing), complete external black box Red Team/Adversary Emulation & Simulation tests, social engineering, in person physical testing and cloud data center/server room testing (lock picking, trade craft, in person social engineering, impersonation, sabotage, etc.) and as it goes for my entire career, I have been part of over 1500+ engagements, with a VERY VERY high rate of success, no matter the OS or environment given to me, no matter what AV/EDR is in place, I will find a way. Also I am an expert at professional style report writing, as you may know working in the corporate enterprise space you need to style a report for the exec's that know nothing about tech, and then a much more technical and high level one, for those we most likely will be part of the remediation process.
To list a few things that I am considered an expert, or master in my field at, check out the following:
--Open Source Intelligence Gathering, malware analysis, and cloud security audits using tools such as Metasploit, OWASP ZAP, Nikto, NMAP, Masscan, LOTL techniques, custom exploit, exploit dev, malware dev, code reviews, cyber framework and compliance re-structuring or hardening (NIST, CIS, SEC Policy, CISA, HITRUST, etc)
--Before my current job, I was the a Red Team Leader at a fortune 500 Aerospace company that participated in offensive cyberwar and nation state level exploitation for a certain government that takes this kind of thing very seriously. Working for this company, we were considered "government contractors" and did not have to follow certain rules an regulations set by governments at home and around the world, there by not limiting the amount of cyber espionage and kill chain tactics we could deploy. The amount of training and paid for SANS courses, certifications, and lab practice was absolutely immense, increasing my skill set to the upmost top level, with many countries around the world considering us to be some of the best offensive cyber operators in the game today.
--Tier 1 red team operator with extensive practice, both real world, lab, enterprise, cloud, etc, in MANY Command and Control Frameworks (C2), such as Cobalt Strike, Havoc, Nighthawk, Brut Ratel, Heroin, Sliver, Empire, and MITRE Caldera. I also have great experience leveraging many other countless tools that one could find in the Kali Linux Penetration Testing Suite. Working with multiple Enterprise organizations with networks that span the globe and are made to support upwards of 50,000+ employees, being able to utilize tools such as wireshark to record network traffic and then interpret, analyze, and understand this data is another area in which I excel. Other examples of network security I am well versed in is Advanced Web Application Testing using Burpsuite and OWASP Zap, as well as running large scale vulnerability scans using tools like OpenVAS and Nessus. Also, not to mention the countless other tools that one could find in any penetration testing suite, framework, or operating system. I have gained a mastery at utilizing the latest tools and keeping myself familiar with how real world attackers come up with ways in which to breach the highest levels of security, and in a constantly changing threat landscape being able to know the TTP's of all kinds that are currently being leveraged gives me the advantage in helping get to the bottom of those scenarios during a penetration test that other cybersecurity experts will just plain not know about or not know the complex attack chain that could be exploited and compromised. I have over 12+ years of experience as a Cyber Security Consultant, Penetration Tester and Network Administrator, working with various clients and organizations in the cybersecurity and information technology industry. I have multiple certifications from CompTIA, OWASP, and SANS Institute, covering topics such as network security, penetration testing, exploit development, and red team operations. I also hold two Bachelor of Science degrees being part of a prestigious Dual B.S. program from a Major Accredited University, where i graduated with honors. Let me know if you think my credentials and experience are in line with the type of person you are looking to hire.
Thanks,