Daniel Nussko

| Freelancer | Penetration Tester | Security Researcher |

Penetration Tests

Years of experience

CVE's

Daniel Nussko

About me

As an independent security researcher and information security professional I have long-standing experience in the field of audits and penetration tests. I started my career in IT security in 2016, as a penetration tester for a German consulting company specialized in cybersecurity. Since 2018, I have been working as a freelance penetration tester and security researcher. I have an interest in presenting my security research and I have spoken in several international security conferences, such as CanSecWest, SecTor, DeepSec, TyphoonCon and BSides Budapest. My formal education includes a Master of Science in IT security and an OSCP certification.

Penetration test

My services

My goal is to identify potential vulnerabilities before cyber criminals do with malicious intent. Through my services, I would like to support you in addressing vulnerabilities and thus improve the security level of your application or network infrastructure.

  • Individual security analysis according to your needs
  • Manual in-depth security analysis supported by tools and vulnerability scanners
  • In compliance with audit standards such as ASVS and OWASP Top 10
  • Professional report in German or English
  • Risk classification, recommendation for remediation and management summary
  • Fully independent and expert advice

Please don't hesitate to contact me for a free consultation, a list of references or an example report.

Web Application Penetration Test
Application Security

Penetration test of your web application, API or native desktop application. The aim is to identify vulnerabilities and security-relevant misconfigurations in the application itself, its framework, and the underlying server.

  • Web applications
  • APIs, e.g. REST or SOAP services
  • Native desktop applications
Infrastructure Assessment
Infrastructure Assessment

Security analysis of a companies internal IT infrastructure or Internet facing systems. This way, a hacker is simulated trying to break into your corporate network.

  • Identification & analysis of network services
  • Discovery of vulnerabilities, misconfigured services and lack of security hardening
Security analysis of IoT devices
IoT Security

Security assessment of IoT devices, their interfaces as well as firmware analysis.

  • In-depth analysis of the device's network services
  • Analysis of device interfaces, such as Ethernet, WiFi, Bluetooth or ZigBee
  • Static firmware analysis

Contact

Contact Me

I want to help you address your cybersecurity concerns and challenges while you focus on core business. Please don't hesitate to contact me for a free consultation, a list of references or an example report.

Loading
Your message has been sent. Thank you!