what i do?

Am an Information Risk Consultant and Penetration Tester, i specialize mostly in penetrating secure networks/computer systems where i simulate an organized professional attack against your organization, where after that a detailed report with weakness and exploited vectors are summarized. This will help you gain control over your infrastructures security and maximize your protection.

Sunday, December 15, 2013

Black Box Penetration Testing

Before i start on this post, lemmie make it clear, there is nothing like BlackBox Vulnerability Assessment and there is nothing like Blackbox Internal Pentesting. "Shit people say to clients"
Black Box Pentesting is very different and as the world of Information Security changes to Information Risk this form of testing is changing and the clients will need a full and real service.

Forms of pentesting scenarios you should use when testing infrastructures are several, they should be real world. I will explain some here, that i have used over the years, most of them in Middle East and Europe. Just a few in Africa, but am still working through different contracts to educate clients how to pick Real World Pentesting from Normal Pentesting and away from Fake Pentesting.

Insider Threat

This is used a lot in the bank by criminals, where they will hire a developer, janitor or any other members of staff to provide info and access to the infrastructure.

Government Impostors

Pretending be a government agency, doing an investigation, e,g KRA, and due to that most people don't know the law, they will let you do anything to almost everything in an infrastructure.

Covert Data and Evidence Acquisition

Most Spy agencies and also Police use clandestine evidence gains, by hiring hackers to infiltrate a firm, especially Law Firms to gain access to vital information mostly for either National Security or just Superiority.

Thieves, literally Thieves

I have been in security tests where we have stolen wireless devices, broken into desks, jumped over fences, broke windows, cracked safes everything thieves do, I have had confrontation with guards and dogs, but one thing you gotta remember is that you are ethical hacker, and all that stuff you steal should be returned to the client either covertly or at the end of an operation.

Hackers on Hackers on Hackers, Brutal Brutal Hacking

Sometimes clients hire you to just pentest one server and they want this to be the target but they have it heavily secured against attacks and they thinks its safe. so whenever you try everything, it all gets caught and blocked, so as a pentester do you report it can't be broken into or do you do whatever it takes to take over? Well you should, hackers wont stop, they don't give in, they try to gain access to other servers and infrastructures trusted by the main target and so many other options on the ground.

Social Engineering

Talk good, use beautiful women, lie lie lie... is an operational gain during black box operations. Most employees have no Information Security Awareness training, 90% of people around us don't have careers but jobs, they don't care where they work, 90% of people around us are under paid, 90% bosses and leaders care less about their employees, we use that info to infiltrate an infrastructure.


Most banks lose lots of money due to fraudsters, not just a hackers. So if you are testing stuff like Internet Banking, Mobile Banking and ATM Security, you need to think like a crazy Nigerian attacker. do some reading about them and let me know what you think.


The Service and Research Organizations lose a lot of millions due to data leakage and theft. This mostly happens due to competition between two companies that offer the same service and if this is the highest risk that such an organization has, you should test it, since the client will surely need to know how far the damage will go.

Organized Criminals

I have seen so many banks lose millions due to organized crime, i know about these Banking Cartels that work with the CBK and other government offices to launder money and steal lots of it from different public offices and the normal pure Organized Criminals who just use everything to gain access to safes, and other important and secured commodities. So use of hardware like keyloggers, stakeouts, chase-outs, guards -payday, tailing, Mens-Lusts, family vulnerabilities, social media etc are used on such operations. Give the client the best.


A lot of organizations, groups, memberships are always targeted by different adversaries, who just want to deface and damage their names for a cause. These attacks mostly include website defacements, Denial of Service Attacks and many others which are not as sophisticated as the ones above. These tests are essential when you want to know how much damage you would get and how fast your Incident Handling team can handle and forensically investigate it.


dwahome said...

Nice write-up Chuks!

paul singh said...

open vas vulnerability scanner is an open source scanner similer to nessus which is comercial version of this http://born2hack.hpage.com/open-vas-web-vulnerability-scanner_12672677.html

Wilson Davis said...

Thanks for sharing. Learn a lot from your Blog.I have read your blog about Penetration Testing It is very help full.I really enjoyed reading it, you may be a great author.I must say you've done a wonderful job by sharing your article with us. External penetration testing