Penetration Test

Penetration Test is an assessment that evaluate the security of an IT infrastructure by safely simulating a real-world hacking scenario.
The goal is to help identify specific risks which, when addressed, will positively impact on your overall security.
xfiltrated's background include years of experience hunting vulnerabilities on :

  • Software Web,Mobile,Desktop and Server applications
  • Security devices and systems turnstiles, webcams ecc...
  • Large public and internal networks your external network perimeter or intranet network.
  • Wireless and IoT devices and various new toys
  • Phisical buildings Server farms and other critical environments

Penetration tests are customized to your environment; no two assessments are ever the same.

Intrusion Detection and Prevention

Intrusion detection/prevention solutions are key elements of a good security strategy.
Depending on the target network and security level several solutions could be adopted, like:

  • WAF stands for Web Application Firewall, it is the simplest, fastest and sometimes the most efficent technology. It is meant for detecting and blocking web applications attacks.
  • IDS stands for Intrusion Detection System, this is a more complex approch but very efficent. It will monitor your network traffic for malicious activities costantly and it will help to identify possible threats from both outside and inside.
  • IPS stands for Intrusion Prevention System, same as the IPS but with the difference that malicious traffic is also blocked once detected.

Intrusion investigation and Incident Response

Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident, or security incident.

Have you been hacked? Are your data or systems compromised?

No matter how big or how small a company, everyone can be susceptible to a security breach.
The purpose of this operation is to provide a detailed report that find an answer to the most pressing questions after an incident has happened, finding the correct approch to mitigate the issue and help tracking the root cause.


Card image cap

post exploitation 1337 tool

Card image cap


network reconnaissance toolkit


Awards and Certifications