Offensive Operation

Our Red Team with 15+ years of expertise in offensive cybersecurity and intelligence is able to perfom offensive operations in order to uncover and catch threat actors by attacking their digital assets:

  • Web site:
    We focus on uncover any threat actor who acts behind web sites used to scam/harm other people or selling/promoting illegal contents. The process involves using clandestine-HUMINT and exploiting techniques.

  • Onion site:
    We focus on uncover any threat actor who acts behind TOR onion sites used to scam/harm other people or selling/promoting illegal contents. The process involves using clandestine-HUMINT and exploiting techniques.

  • Digital persona:
    We focus on uncover any threat actor who acts behind a digital "persona" (social profile or e-mail address) who is scamming/harming other people or selling/promoting illegal contents. The process involves using clandestine-HUMINT and exploiting techniques.

Rules of Engagement

  • Mission: Attacking Threat Actor's digital assets in order to deanonymize them
  • Modality: Black-box
  • Methodology: OWASP, OSSTMM, CEH, PTES, MITRE ATT&CK, NATO
  • Location: From a remote side
  • Privacy: NDA, encrypted deliverables, secure-deletion
  • Deliverable: Report with a description of the entire activity and artifacts collected
  • Price: Get a quote

Copyright © 2012-2021 Fulgur Security - P.iva/Vat IT03343330795