Penetration Testing
External, internal, Active Directory and cloud.
A penetration test is the closest you can get to a real attack on your infrastructure without actually being attacked. I work both the external perimeter — anything reachable from the internet — and internal networks, where most of the interesting damage tends to happen once an attacker is past the front door.
Every engagement starts with scoping and rules of engagement: what's in, what's out, and what counts as a meaningful finding. From there I run a structured assessment that mixes automated tooling with manual exploitation, because scanners on their own miss the things that matter. The bugs that hurt clients are usually chained misconfigurations, broken trust assumptions, or the kind of password reuse that turns a low-severity finding into Domain Admin three steps later.
What you get back is a written report with findings ranked by real-world impact, reproduction steps, and remediation guidance specific to your stack. I don't bury the technical detail behind generic OWASP wording, and I don't pad the report with informational noise to make it look thicker. Where it helps, I'll sit down with your engineers afterwards to walk through the harder findings so the fix actually sticks.
Typical scopes include external network, internal network, Active Directory, AWS / Azure / GCP cloud accounts, and segmented industrial environments. If you're not sure what you need yet — that's usually the first conversation, and an hour on a call costs nothing.