Certified Ethical Black Hat that offers an outstanding customer service and fully detailed results. Expert in PHONE HACK (iOS, Android) FUNDS RECOVERY (Binary Options), DELETION of unwanted messages/posts. Vast experience in exposing just about anything, check me out.
Very ethical and strong
Quick, he had a set template for activision account modification and hack.. I will use him again
Got access in a couple of hours, will be recommending
I didn't like his approach but he delivered, glad I didn't question him.. Thanks a lot
After carefully accessing the website and getting started, he confirmed to me my job wasn't executed because of complications I agree with and a refund was initiated. Thank you for your honesty, hope to work together again
Turnaround time was unbelievable.. BLess you
He promised to get it done in 8 hours but I had to wait almost 12 hours, he apologized and I understand.. Overall he delivered, will work with him again
Add work experience to your profile. (optional)
Conducted network penetration tests and implemented vulnerability assessments.
Evaluated operational effects of security system attacks.
Analyzed and resolved vulnerabilities in relation to automated networks.
Prepared and documented test plans for security evaluations.
Designed and updated reports about security of targeted systems.
Developed training programs and trained ethical hackers.
Participated in courses for password cracking and attack technologies.
Supported and administered security of intranet systems and networks
Add work certification to your profile. (optional)
Information security overview
Information security threats and attack vectors
Ethical hacking concepts
Information security controls
Cyber defence and ICS
Digital Forensics and incident response
Active Directory Attacks
Introduction to Buffer Overflows
Passive Information Gathering
Win32 Buffer Overflows
Web Application Attacks
Port Redirection and Tunneling
The Metasploit Framework
Advanced network reconnaissance including stealth scans and identification of services running on non-standard ports
Monitoring switched networks using arp spoofing and other techniques
The dangers and detection of covert channels are explored using ICMP, UDP, TCP and HTTP protocols
SQL hacking methodologies
Advanced UNIX® configuration techniques
Compilation and test of malicious Linux® Kernel Modules
Add work education to your profile. (optional)
A Computer Science Graduate Certificate that provided me with a solid course of study in the mathematical foundations of computing as well as important aspects of computer programming, database security, algorithm, Artificial intelligence and Data computation.
We will review the reports from both freelancer and employer to give the best decision. It will take 3-5 business days for reviewing after receiving two reports.