Defending the Digital World

AI | Blockchain | Telecommunications

Defensahacker Labs is a boutique consulting firm, providing cybersecurity advisory and pentesting services to companies worldwide

4

top cybersecurity certifications

+150

penetration testing projects

+20

years experience

Cybersecurity Excellence

Ethical Hacking involves simulated cyberattacks on a system, network, or application to identify vulnerabilities and weaknesses that malicious hackers could exploit. It helps assess the effectiveness of existing security measures.

Having worked as a consultant and penetration tester for top tier banks, the European Central Bank, pharmaceutical and automotive companies across several regions and continents. We have a vast experience in all types of companies and projects.

CEH Certified Ethical Hacker
OSCP Offensive Security Certified Professional
CBSP Certified Blockchain Security Professional
CSCA Certified Smart Contract Auditor
.1

Penetration Testing

Involves simulated cyberattacks on a system, network, or application to identify vulnerabilities and weaknesses that malicious hackers could exploit. It also helps to assess the effectiveness of existing security measures

.2

Vulnerability Assessment

Conducts a systematic review of hosts, servers, networks and applications to identify, classify and validate vulnerabilities that can affect the security of the company

.3

Smart Contracts & Web3 Security

New technologies such as blockchain, involve many risks. We assess the infrastructure, smart contracts audits and blockchain deployment for Web3 projects

.4

OT Cybersecurity Audit

OT (Operational Technology) is a paramount component in our industries. PLCs, Scada and IoT components are usually misconfigured and allow attackers to disrupt warehouse operations. We identify and help you to patch any vulnerability

.5

Secure Software Development

We also apply our security expertise to develop software with high standards of security: Mobile apps, blockchain development, payment gateways, etc

.6

Cybersecurity Consultancy

With a vast experience advising top banks, mobile video games, social network apps among others, we can also give guidance to your startup to minimize risks and become more resilient

.7

Phishing Simulations

Using same techniques as hackers do, with custom domains and tailor made emails, we lure your employees to click in a legit looking email that could compromise your organization. Extra guarantee: We do not charge anything if the emails did not get to your inboxes

.8

Active Directory Compromise

We check your Domain Controllers resilience against common attacks such as password spraying and lateral movement due to misconfigurations

.9

Mobile Apps Security Testing

With advanced reverse engineering techniques, we assess the security of your mobile apps and also propose hardening to block hackers to intercept your data or enhance your security

Our Team

Extensive experience tailored for your needs

Jacobo Avariento

Security Lead

Jacobo is a Certified Ethical Hacker, smart contracts auditor and lead security engineer with over 20 years of experience in cybersecurity, particularly within the banking and finance industries

Client Testimonials

United

We have been impressed with this persistence in finding bugs, his ability to explain his findings and Mr. Avariento is welcome and respected contributor to our Bounty program and we look forward to any additional submissions he provides

Airbus

Mr. Avariento was entrusted with the Technical Management of the Security Testing project team at the European Central Bank. He always fulfilled his tasks to our absolute satisfaction. He was extremely skilled employee and always served our customers very courteously and professionally

HP Enterprise

Hewlett Packard Enterprise would like to thank Jacobo Avariento working with Defensahacker for reporting CVE-2017-12544

TRY OUR ON-CHAIN SMART CONTRACT SCANNER

SUPPORTS ETHEREUM, ARBITRUM, BSC, AVALANCHE, POLYGON, BASE, GNOSIS

Latest news

close up of computer hardware

Most critical GPO misconfigurations in Active Directory

Group Policy Objects (GPOs) are a double-edged sword in Active Directory. They’re designed to enforce[…]

close up of computer hardware

Offensive Security in Active Directory: Top 5 Risks and Pentesting Tools

Active Directory (AD) is the heart of identity and access management in most enterprise Windows[…]

Cybersecurity Android Apps

How to root Android 12 (Google Pixel 3a)

Let’s see how to root an Android phone with a rooted Android from the official[…]

What is Penetration Testing?

A penetration test, colloquially known as a pentest or as ethical hacking, is an authorized simulated attack performed to[…]

Contact Info

Let’s Chat

Get in touch with us to discuss your needs.