Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ, Founder at Futaba_Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

πŸŽƒ Services πŸŽƒ Business Card πŸŽƒ Terminal πŸŽƒ Discord Server πŸŽƒ Blog πŸŽƒ Get started πŸŽƒ Resume πŸŽƒ Search Mode πŸŽƒ Latest News πŸŽƒ Catalogs πŸŽƒ Services 2

πŸŽƒ Service Glossary

πŸ•Έ Goal Of Futaba_Webs πŸ•Έ

Futaba_Webs is a Cyber Security firm that serves to offer a unique range of Cyber Security services with a unique experience while protecting vast complex business I.T. infrastructures, the main goal being to not only protect the end user, but to educate them.

The goal is to get you to understand WHY you need security vs just simply implementing it.

When you click on any of the cards below, you’ll not only be presented with full in depth information about each service, but the logical and scientific reasoning behind them and what they aim to achieve in protecting your system infrastructure.

Over the course of each service you’ll not only get the help you need to protect your systems, you’ll also receive the proper educational awareness to WANT to apply ethical and adaptable Cyber Security practices for your business infrastructure.

If this sounds interesting to you, feel free to take a look at the rest of the service glossary and navigate to anything that is of interest to you!



πŸ•Έ Service List πŸ•Έ

My list of services can be found here:

πŸŽƒ Penetration Testing Services πŸŽƒ

πŸŽƒ Secure Coding Services πŸŽƒ

πŸŽƒ Malware Analysis Services πŸŽƒ

πŸŽƒ Blue Teaming Services πŸŽƒ

πŸŽƒ Patreon Store Catalog πŸŽƒ

πŸŽƒ Website Design Services (Coming Soon) πŸŽƒ

πŸŽƒ Resume Workshop (Coming Soon) πŸŽƒ

You can click on any of the sections to simply check that one out if it interests you!

NOTE: Click on the laptop icon shown above each serivce to take you to where to inquire (coming soon) for them

πŸ•Έ Bookings πŸ•Έ

Interested in booking an inquiry? Click on any of the links bellow to get started

πŸŽƒ Penetration Testing Services πŸŽƒ

πŸŽƒ Secure Coding Services πŸŽƒ

πŸŽƒ Malware Analysis Services πŸŽƒ

πŸŽƒ Blue Teaming Services πŸŽƒ

πŸŽƒ Patreon Store Catalog πŸŽƒ

πŸŽƒ Website Design Services (Coming Soon) πŸŽƒ

πŸŽƒ Resume Workshop (Coming Soon) πŸŽƒ









πŸŽƒ Penetration Testing Services πŸŽƒ


πŸ•Έ Web Application πŸ•Έ



Need a Web Application Security Penetration Tester to test the security of your website?


I’ll test all sorts of stuff for you depending on the overall scope:


πŸŽƒ Injection based attacks


πŸŽƒ Local and Remote File inclusions


πŸŽƒ Session Hijacking & Cross Site Forgery


πŸŽƒ Cross Site Scripting


πŸŽƒ Login Security and Bruteforce testing


πŸŽƒ DDOS & Load Balancer Tests


As well as fuzzing and other various forms of Unicode parameter based methods and a lot more!


Want an overall run down of the procedure?



πŸ•Έ Network Testing πŸ•Έ



Network penetration testing is one of my specialties, whether it be physically or remotely. Book a session with me to see if there are any security issues on your network.


I’ll check for stuff like


πŸŽƒ Redundant systems that can easily be taken over or used to infect your network


πŸŽƒ Proper Port forwarding implementation to mitigate physical taps on switched networks


πŸŽƒ Proper subnetting implementation


πŸŽƒ Defense measures agaisnt network traffic interception


πŸŽƒ Potential open services that might exist from: end user systems, printers, etc


And a lot more! There’s endless testing that can be done here!


Want an overall run down of the procedure?



πŸ•Έ API Security πŸ•Έ



Didn’t know I also specialize in API Security? Well I’m a jack of all trades!

Book a session with me here to test out your API being used in your overall infrastructure, whether it be a house made one, or one you’ve uniquely implemented into your business infrastructure.


API security is important, since it’s the overall biological makeup of all the necessary function calls for your programs to run, function calls that if used by the wrong hands, can be deadly.


End users incorporate the use of your API much like you do with other sites on a regular basis. When you allow them to use it, it needs to be done with security in mind, otherwise you’ll fall victim to an attack!


Exploitation Development services, which is an added consulting fee also comes with this server. I'll walk you through diagrams and various potential attack vectors that might exist in your API infrastructure


Want an overall run down of the procedure?










πŸŽƒ Secure Coding Services πŸŽƒ


πŸ•Έ Coding Assessments πŸ•Έ



Secure by design should be a standard when it comes to any form of modern computing technology: Biotechnology, Nanotechnology, A.I., etc. As technology evolves, so does the capacity and toolset of threat actors.

Consulting from this service, you’ll gain valuable insights on vulnerabilities that exist in your code base infrastructure. This will not only allow you to better secure your code, but develop with security in mind.


Want an overall run down of the procedure?



πŸ•Έ Exploitation Demos πŸ•Έ



In order to emphasize the level of risk a lack of secure code by design has on business infrastructures, I offer services where I engage in exploitation development, showing the REAL level of damage that can be done if left unattended.

I’ll be diving into stuff like attack models/trees, diagraming all plausible and logical attack surfaces.

Not only will this give my clients a deep perspective of the various possible ways existing vulnerabilities can be exploited, but it’ll also get them into the habit of thinking several steps ahead when implementing ANY form of technology into their infrastructure.

Want an overall run down of the procedure?



πŸ•Έ Mitigation Demos πŸ•Έ



Part of my services will also include, should clients choose to mitigate the risk, will involve me not only devising various mitigation strategies, but also implementing them.

This means that a mere Secure Coding assessment could turn into me working with actual developers to figure out how to patch their systems.

Want an overall run down of the procedure?










πŸŽƒ Malware Analysis Services πŸŽƒ


πŸ•Έ Malware Removal Services πŸ•Έ



Malware removal is tricky. If you’re not careful, you could damage your systems further by trying to do so yourself. If you have ANY system that has been compromised by malware, I’ll take a look at it and go about removing it for you.


Services like this, although it might be possible to remote in and do a little inspection on some of the processes running on the system, this one’s best served via either sending the physical system over to me, OR, an onsite visit if need be. Simply tell me all the symptoms, I’ll look into it and ping you back on how to best deal with the situation. Consultation fees vary depending upon the type of engagement.


Want an overall run down of the procedure?



πŸ•Έ Malware Researcher πŸ•Έ



Need a Malware Researcher? Found an executable you find suspicious and need me to look into it? I can take care of that for you! Simply bring me the executable, I’ll place it in a Sandbox environment and take a look at it for you.

I can also take a look at any source code you either suspect of being malware, OR, is in fact malware, breaking down all the root attack vectors and methodologies behind them so you can further your defenses.

Want an overall run down of the procedure?



πŸ•Έ Malware Developer πŸ•Έ



Need an expert at writing malware for offensive security engagements? I’m the person to go to! This is also where tool development and anything along the line occurs for Red Team engagements.


Malware development comes in handy when training your detection systems. Malware comes in various types, each with their own unique signature pattern. By creating malware and testing it against your security systems, I can pinpoint key things it might miss which can lead to stuff like Zero Day exploits, which are severe vulnerabilities that are able to go undetected by either person or system.


Want an overall run down of the procedure?



πŸ•Έ Malware Workshops πŸ•Έ



Interested in having me teach people about the art of Malware? Not only in terms of reverse engineering it, BUT, on how to write it for research and exploitation development purposes? Book me on your calendar and I’ll set up a workshop for you!

Want an overall run down of the procedure?










πŸŽƒ Blue Teaming Services πŸŽƒ


πŸ•Έ Vulnerability Assessments πŸ•Έ



This time around, rather than assess your code base infrastructures, this time around I’ll be doing so for any particular system you have.


Every system has a vulnerability, a weakness that can be exploited. It’s my job to find it before threat actors do.


By consulting in this service, I’ll be able to pinpoint weaknesses in any system you have, outlining the strategic means to better secure them.


Want an overall run down of the procedure?



πŸ•Έ Threat/Risk Assessments πŸ•Έ



This time around, rather than assess for vulnerabilities, I’m assessing potential threats/risks in your systems.


The scope of what both you and I will be doing will be the same as in the previous card since it aligns in terms of how I approach.


One of my specialties is pinpointing risk/threats BEFORE they surface.


Much like how every system has a vulnerability, a weakness that can be exploited, they also have potential threats/risks where if unattended they can turn into actual weaknesses in the system.


By consulting in this service, I’ll be able to pinpoint potential weaknesses in any system you have, outlining the strategic means to better secure them.


Want an overall run down of the procedure?



πŸ•Έ IR Services πŸ•Έ



Didn’t think a Red Teamer could be good at IR? Think again! Who knows better than someone who specializes in reverse engineering and forensics!


Much like my Secure Coding services, where I work alongside your dev team to uncover vulnerabilities in your codebase, this time around, I’ll be working along your IR team to uncover various root causes that led to Security Incidents.


Want an overall run down of the procedure?










πŸŽƒ Patreon Store Catalog πŸŽƒ


πŸ•Έ White Paper Research πŸ•Έ



I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level!

I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here!


My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!

You can find out more about my research in my Patreon here! Reviews can be found here!

Check out a glimpse of some of my various series here!


πŸ•Έ Patreon Goodies πŸ•Έ



These are all the various goodies you get when you join any of my tiers.


My patreon, on top of my various consulting services is one of the many ways I support myself and my brand!


Do you like merch?! That’ll be coming soon, with it being exclusive to members that join my tiers!


Check out some of the tier goodie descriptions here!

You can find links to my patreon down in the contact section at the bottom of this page!



πŸ•Έ Tier Subscriptions πŸ•Έ



These are all the various perks you get when you join any of my Patreon tiers.


The main one promoted here, which I recommend, is my $30 a month Cyber Security tier. The perks are EXTENSIVE, and I mean EXTENSIVE! They should be as I emphasize getting every bang for your buck! You’ll have access to exclusive material I don’t post anywhere as well as early access, and goodies exclusive to your tier. This also included Discord perks.


The second one I recommend, since I encourage tier swapping in order to get all the goodies, would also be my collection tier which is a bundle for $250, giving you FULL access to all of the previous tier perks as well as any goodies associated with them. You can hop on this tier, gain the ability to download any videos and content that you like as well as months of extensive research material, and then drop back down and rinse and repeat again until new content comes out.


I’ve also set up the ability to INDIVIDUALLY purchase ANY item you want on my store if subbing isn’t your thing.


Check out the descriptions for some of my tiers and support the brand!



πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States