top of page

Welcome to Hacker  Astra's World

    The hacker community may be small , but it posses the key that drive's the future global economy........

     I am still a hacker. i get paid for it now. i never recieved any monetary gain from  the hacking i did before. the main difference in what i did before and what i do now is that i now do it with authorization

                                                                      Hack The Planet...........

Home: Welcome
Walk in the Desert

BASICS  of our services

a) Penetration testing; and

b) Vulnerability assessments.

The second (vulnerability assessment), is basically running a scan and providing them with a report. In some cases the vulnerabilities are only very briefly verified, but generally not exploited in depth. This is to eliminate false positives.

The first (penetration testing), builds on top of the vulnerability scanning, with the following simplified tasks:

  1. Enumerate hosts

  2. Identify vulnerabilities

  3. Exploitation

  4. Post exploitation

  5. Pivot

  6. Identify additional hosts (in scope) and then continue from number 1 with the new hosts.

  7. Source code reviews

  8. Social engineering

  9. Physical penetration testing 

  10. Red teaming (This is a “combination” of several services.)

  11. Sub-topics within this industry may include:

  12. Archiecture reviews

  13. Configuration reviews (Host Security Assessments)

  14. PCI DSS penetration tests (These are like regular pentests but they must also adhere to all PCI DSS rules and raise all PCI DSS relevant requirement breaches.)

  15. Training of employees (security awareness, maybe even coding)

  16. GRC (Governance, Risk and Compliance. This is “checklist security” like ISO27001.)      .

Home: About
Wildlife

Opening Hours

MON-SUN 24

Home: Hours

Contact

Thanks for submitting!

Home: Contact
bottom of page