Futaba_Webs is a Cyber Security firm that serves to offer a unique range of Cyber Security services with a unique experience while protecting vast complex business I.T. infrastructures, the main goal being to not only protect the end user, but to educate them. The goal is to get you to understand WHY you need security vs just simply implementing it. When you click on any of the cards below, youβll not only be presented with full in depth information about each service, but the logical and scientific reasoning behind them and what they aim to achieve in protecting your system infrastructure. Over the course of each service youβll not only get the help you need to protect your systems, youβll also receive the proper educational awareness to WANT to apply ethical and adaptable Cyber Security practices for your business infrastructure. If this sounds interesting to you, feel free to take a look at the rest of the service glossary and navigate to anything that is of interest to you!
My list of services can be found here: π Penetration Testing Services π π Secure Coding Services π π Malware Analysis Services π π Blue Teaming Services π π Patreon Store Catalog π π Website Design Services (Coming Soon) π π Resume Workshop (Coming Soon) π You can click on any of the sections to simply check that one out if it interests you! NOTE: Click on the laptop icon shown above each serivce to take you to where to inquire (coming soon) for them
Interested in booking an inquiry? Click on any of the links bellow to get started π Penetration Testing Services π π Secure Coding Services π π Malware Analysis Services π π Blue Teaming Services π π Patreon Store Catalog π π Website Design Services (Coming Soon) π π Resume Workshop (Coming Soon) π
Need a Web Application Security Penetration Tester to test the security of your website?
Iβll test all sorts of stuff for you depending on the overall scope:
π Injection based attacks
π Local and Remote File inclusions
π Session Hijacking & Cross Site Forgery
π Cross Site Scripting
π Login Security and Bruteforce testing
π DDOS & Load Balancer Tests
As well as fuzzing and other various forms of Unicode parameter based methods and a lot more!
Want an overall run down of the procedure?
Network penetration testing is one of my specialties, whether it be physically or remotely. Book a session with me to see if there are any security issues on your network.
Iβll check for stuff like
π Redundant systems that can easily be taken over or used to infect your network
π Proper Port forwarding implementation to mitigate physical taps on switched networks
π Proper subnetting implementation
π Defense measures agaisnt network traffic interception
π Potential open services that might exist from: end user systems, printers, etc
And a lot more! Thereβs endless testing that can be done here!
Want an overall run down of the procedure?
Didnβt know I also specialize in API Security? Well Iβm a jack of all trades! Book a session with me here to test out your API being used in your overall infrastructure, whether it be a house made one, or one youβve uniquely implemented into your business infrastructure.
API security is important, since itβs the overall biological makeup of all the necessary function calls for your programs to run, function calls that if used by the wrong hands, can be deadly.
End users incorporate the use of your API much like you do with other sites on a regular basis. When you allow them to use it, it needs to be done with security in mind, otherwise youβll fall victim to an attack!
Exploitation Development services, which is an added consulting fee also comes with this server. I'll walk you through diagrams and various potential attack vectors that might exist in your API infrastructure
Want an overall run down of the procedure?
Secure by design should be a standard when it comes to any form of modern computing technology: Biotechnology, Nanotechnology, A.I., etc. As technology evolves, so does the capacity and toolset of threat actors.
Consulting from this service, youβll gain valuable insights on vulnerabilities that exist in your code base infrastructure. This will not only allow you to better secure your code, but develop with security in mind.
Want an overall run down of the procedure?
In order to emphasize the level of risk a lack of secure code by design has on business infrastructures, I offer services where I engage in exploitation development, showing the REAL level of damage that can be done if left unattended. Iβll be diving into stuff like attack models/trees, diagraming all plausible and logical attack surfaces. Not only will this give my clients a deep perspective of the various possible ways existing vulnerabilities can be exploited, but itβll also get them into the habit of thinking several steps ahead when implementing ANY form of technology into their infrastructure.
Want an overall run down of the procedure?
Part of my services will also include, should clients choose to mitigate the risk, will involve me not only devising various mitigation strategies, but also implementing them. This means that a mere Secure Coding assessment could turn into me working with actual developers to figure out how to patch their systems.
Want an overall run down of the procedure?
Malware removal is tricky. If youβre not careful, you could damage your systems further by trying to do so yourself. If you have ANY system that has been compromised by malware, Iβll take a look at it and go about removing it for you.
Services like this, although it might be possible to remote in and do a little inspection on some of the processes running on the system, this oneβs best served via either sending the physical system over to me, OR, an onsite visit if need be. Simply tell me all the symptoms, Iβll look into it and ping you back on how to best deal with the situation. Consultation fees vary depending upon the type of engagement.
Want an overall run down of the procedure?
Need a Malware Researcher? Found an executable you find suspicious and need me to look into it? I can take care of that for you! Simply bring me the executable, Iβll place it in a Sandbox environment and take a look at it for you. I can also take a look at any source code you either suspect of being malware, OR, is in fact malware, breaking down all the root attack vectors and methodologies behind them so you can further your defenses.
Want an overall run down of the procedure?
Need an expert at writing malware for offensive security engagements? Iβm the person to go to! This is also where tool development and anything along the line occurs for Red Team engagements.
Malware development comes in handy when training your detection systems. Malware comes in various types, each with their own unique signature pattern. By creating malware and testing it against your security systems, I can pinpoint key things it might miss which can lead to stuff like Zero Day exploits, which are severe vulnerabilities that are able to go undetected by either person or system.
Want an overall run down of the procedure?
Interested in having me teach people about the art of Malware? Not only in terms of reverse engineering it, BUT, on how to write it for research and exploitation development purposes? Book me on your calendar and Iβll set up a workshop for you!
Want an overall run down of the procedure?
This time around, rather than assess your code base infrastructures, this time around Iβll be doing so for any particular system you have.
Every system has a vulnerability, a weakness that can be exploited. Itβs my job to find it before threat actors do.
By consulting in this service, Iβll be able to pinpoint weaknesses in any system you have, outlining the strategic means to better secure them.
Want an overall run down of the procedure?
This time around, rather than assess for vulnerabilities, Iβm assessing potential threats/risks in your systems.
The scope of what both you and I will be doing will be the same as in the previous card since it aligns in terms of how I approach.
One of my specialties is pinpointing risk/threats BEFORE they surface.
Much like how every system has a vulnerability, a weakness that can be exploited, they also have potential threats/risks where if unattended they can turn into actual weaknesses in the system.
By consulting in this service, Iβll be able to pinpoint potential weaknesses in any system you have, outlining the strategic means to better secure them.
Want an overall run down of the procedure?
Didnβt think a Red Teamer could be good at IR? Think again! Who knows better than someone who specializes in reverse engineering and forensics!
Much like my Secure Coding services, where I work alongside your dev team to uncover vulnerabilities in your codebase, this time around, Iβll be working along your IR team to uncover various root causes that led to Security Incidents.
Want an overall run down of the procedure?
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware! You can find out more about my research in my Patreon here! Reviews can be found here! Check out a glimpse of some of my various series here!These are all the various goodies you get when you join any of my tiers.
My patreon, on top of my various consulting services is one of the many ways I support myself and my brand!
Do you like merch?! Thatβll be coming soon, with it being exclusive to members that join my tiers!
Check out some of the tier goodie descriptions here! You can find links to my patreon down in the contact section at the bottom of this page!
These are all the various perks you get when you join any of my Patreon tiers.
The main one promoted here, which I recommend, is my $30 a month Cyber Security tier. The perks are EXTENSIVE, and I mean EXTENSIVE! They should be as I emphasize getting every bang for your buck! Youβll have access to exclusive material I donβt post anywhere as well as early access, and goodies exclusive to your tier. This also included Discord perks.
The second one I recommend, since I encourage tier swapping in order to get all the goodies, would also be my collection tier which is a bundle for $250, giving you FULL access to all of the previous tier perks as well as any goodies associated with them. You can hop on this tier, gain the ability to download any videos and content that you like as well as months of extensive research material, and then drop back down and rinse and repeat again until new content comes out.
Iβve also set up the ability to INDIVIDUALLY purchase ANY item you want on my store if subbing isnβt your thing.
Check out the descriptions for some of my tiers and support the brand!