I am a certified (OSCP) Penetration Tester and I will provide a broad range of IT security services, adaptable to fit your needs. My general plan of a penetration test consists of
the following phases
* Information gathering
Information gathering is divided in two stages. Open services information gathering (DNS enumeration, host lookups etc.) and service enumeration which focuses on gathering information about what services are alive on a system or systems.
*Vulnerability assessment
After identifying the running services a thorough investigation is performed in order to identify vulnerable components and/or configurations. The assessment is a product of popular automatic tools (which provide only a general prespective), tools developed by me and manual labor, which is the only way to safely confirm (or discover) potential vulnerabilities.
*Exploitation
Upon your request, I can exploit possible vulnerabilities to discover the threat level they pose to your system. Most clients do not request this service, especially on production servers, because exploitation consequences are usually not always predictable (possible DoS etc.)
After the penetration test, you will receive a detailed penetration test report (following worldwide standards) containing the findings and mitigation suggestions for each particular vulnerability found.