AN INDEPENDENT CYBERSECURITY CONSULTANCY.
PENETRATION TESTING, CLOUD SECURITY REVIEW,
AND INFRASTRUCTURE DEFENSE.
BASED IN KYIV, UKRAINE.
PENETRATION TESTING, CLOUD SECURITY REVIEW,
AND INFRASTRUCTURE DEFENSE.
BASED IN KYIV, UKRAINE.
PERIMETER.SYSTEMS
WEB, NETWORK, AND MOBILE APPLICATION
SECURITY ASSESSMENTS. CLOUD REVIEWS.
WEB, NETWORK, AND MOBILE APPLICATION
SECURITY ASSESSMENTS. CLOUD REVIEWS.
STATUS: ACTIVE
INDEPENDENT RESEARCHER
KYIV, UKRAINE
INDEPENDENT RESEARCHER
KYIV, UKRAINE
OWASP TOP10, OAUTH 2.0, MSTG, OSINT, AWS, GCP, AZURE, CLOUDFLARE.
AVAILABLE FOR ENGAGEMENT
PERIMETER
DEFENSE
THOROUGHLY INSPECTING ALL ASPECTS OF MODERN APPLICATIONS TO HELP YOU IDENTIFY WHERE YOU ARE VULNERABLE TO EXTERNAL ATTACK. DEFINE YOUR SECURITY BOUNDARIES.
005
SVC.05
ACTIVE
WEB / NETWORK / MOBILE / CLOUD / DDOS PROTECTION
0x5A
SERVICE_MATRIX
SVC:005
WEB
NET
MOB
CLOUD
DDOS
PENETRATION TESTING / SECURITY AUDIT / CLOUD REVIEW
VIEW SERVICES
CERTIFICATIONS
AWS SECURITY – SPECIALTY
AWS CLOUD PRACTITIONER
AMAZON WEB SERVICES
AWS CLOUD PRACTITIONER
AMAZON WEB SERVICES
ACHIEVEMENTS
#1 WORLDWIDE RANKING
CONFidence CTF POLAND
VERIFIED
CONFidence CTF POLAND
VERIFIED
CREDENTIALS
ID
CREDENTIAL
ISSUER
STATUS
01
AWS SEC SPECIALTY
AMAZON
VALID
02
AWS CLOUD PRACT
AMAZON
VALID
03
#1 WORLDWIDE
BUG BOUNTY
VERIFIED
04
CONFidence CTF
POLAND
COMPETED
PERIMETER.SYSTEMS / KYIV, UKRAINE /
SERVICES
ASSISTING BUSINESS EFFORTS
IN CYBERSECURITY
IN CYBERSECURITY
01
WEB APPLICATION PENTEST
ACTIVE
CONDUCTING SECURITY AUDIT OF WEB APPLICATIONS RANGING FROM LANDING PAGES TO ECOMMERCE AND CRYPTOCURRENCY EXCHANGE PLATFORMS. SEARCHING FOR OWASP TOP10, OAUTH 2.0, AUTHORIZATION, AUTHENTICATION VULNERABILITIES.
02
EXTERNAL & INTERNAL NETWORK PENTEST
ACTIVE
ANALYSING AND SCOPING INFRASTRUCTURE ATTACK SURFACE, CONDUCTING OSINT ACTIVITIES, DETAILED SERVICES INSPECTION FOR VULNERABILITIES.
03
iOS & ANDROID MOBILE APPLICATION PENTEST
ACTIVE
CONDUCTING SECURITY AUDIT OF MOBILE APPLICATIONS ACCORDING TO OWASP MSTG, FINDING DATA CONFIDENTIALITY VULNERABILITIES, CHECKING IMPLEMENTATION OF SECURITY BEST-PRACTICES IN iOS AND ANDROID APPLICATIONS.
04
CLOUD DEPLOYMENT REVIEW
ACTIVE
CONDUCTING CLOUD DEPLOYMENT AUDIT OF INFRASTRUCTURE IN AMAZON AWS, GOOGLE CLOUD PLATFORM, MICROSOFT AZURE, DIGITAL OCEAN AND OTHER CLOUD PROVIDERS.
05
DDOS PROTECTION
ACTIVE
IF YOUR APPLICATION STRUGGLES WITH DDOS ATTACKS — I WILL IDENTIFY WEAK POINTS IN YOUR APPLICATION AND SECURE IT WITH ANTI-DDOS SOLUTION (CLOUDFLARE).
0100100001100101011011000110110001101111001000000101011101101111011100100110110001100100010010000110010101101100011011000110111100100000010101110110111101110010011011000110010001001000011001010110110001101100011011110010000001010111011011110111001001101100011001000100100001100101011011000110110001101111001000000101011101101111011100100110110001100100
A8 F2 C1 90 B4 3E 7D 1A 5F 8C 29 4B 6E 0D 3A 7F 9C 1E 5B 8A 2F 4D 6C 0B 39 7E 9D 1C 5A 8F 2E 4C 6B 0A 38 7D 9B 1F 5C 8E 2D 4A 6F 0C 3B 7A 9E 1B 5D 89 2C 4F 6A 0E 3C 7B 9F 1A 5E 8B 2A 4E 6D 0F 3D 7C 9A 1D 5F
PERIMETER SCAN INITIATED. VECTOR ANALYSIS COMPLETE. THREAT LEVEL: NOMINAL. ALL NODES REPORTING. FIREWALL INTEGRITY: 100%. IDS/IPS ACTIVE. PACKET INSPECTION ENABLED. ZERO ANOMALIES DETECTED.
0100100001100101011011000110110001101111001000000101011101101111011100100110110001100100010010000110010101101100011011000110111100100000010101110110111101110010011011000110010001001000011001010110110001101100011011110010000001010111011011110111001001101100011001000100100001100101011011000110110001101111001000000101011101101111011100100110110001100100
A8 F2 C1 90 B4 3E 7D 1A 5F 8C 29 4B 6E 0D 3A 7F 9C 1E 5B 8A 2F 4D 6C 0B 39 7E 9D 1C 5A 8F 2E 4C 6B 0A 38 7D 9B 1F 5C 8E 2D 4A 6F 0C 3B 7A 9E 1B 5D 89 2C 4F 6A 0E 3C 7B 9F 1A 5E 8B 2A 4E 6D 0F 3D 7C 9A 1D 5F
PERIMETER SCAN INITIATED. VECTOR ANALYSIS COMPLETE. THREAT LEVEL: NOMINAL. ALL NODES REPORTING. FIREWALL INTEGRITY: 100%. IDS/IPS ACTIVE. PACKET INSPECTION ENABLED. ZERO ANOMALIES DETECTED.