Hacking & Pen Test, LLC
Call Us: 719-646-5416
I am committed
to perform my best Ethical Hacking
...................................................................................................................................................................................................................................................



​Welcome


I graduated from American InterContinental University with a Masters Degree and a grade point average of 4.0 in Information Technology in 2004.  Since that time I had been studying and perfecting my skills in Ethical Hacking.  I guarantee that my work will not damage your system in any way.  I am in business as a corporation but I am a Free Lance Pen tester.  I work by myself, and I will stay on the job as long as it takes.  I can even work remotely.  I use Kali Linux to perform my assessment, pentest.

I offer a vulnerability assessment or a penetration test in accordance to your SOW (Scope of Work) and I will perform to your satisfaction. I simply use the best tools to perform the test to meet my completion and submit a written report.

Recently, hackers had taken on with a new meaning, there is a hacker, an Ethical Hacker, and a cracker.  I am an Ethical Hacker (a white hat)



​                                                                                                               
​                                                                                                                                                                                                                                                                                                                                                                                                                                                                              
   The ultimate goal of conducting a penetration test is to search for vulnerabilities so that they can be addressed. Penetration test can also verify that a system is not vulnerable to a known class or specific defect; or, in the case of vulnerabilities that have been found and reported as fixed, verify that the system is no longer vulnerable to that defect.

Vulnerability assessment is used to evaluate the security settings of an information system. The assessment include the evaluation of security patches applied to and missing from the system. Penetration testing on the other hand is carried out as if the tester was a malicious external attacker, also known as Black Hat, with the goal of breaking into the system and either stealing data or carrying out some sort of denial-of-service.

A good explanation of an exploit is when a pen tester or hacker uses software , data, or a series of commands to perform the attack. What they are looking for are weaknesses in the system to carry out some type of malicious intent, that could be a denial of service attack, a Trojan Horse, a worm or viruses. The weaknesses that these pen testers and hackers find could be a bug, a glitch in the system, or simply configuration. When a remote exploit is conducted it is mainly checking for security vulnerabilities.