- OWASP Top 10 manual testing
- PDF report with risk rankings
- Remediation recommendations
- Free re-test after fixes
Daniel Ordonez Arango
Available for engagementsPenetration tester specialized in web apps & Active Directory.
I help startups and SMBs find exploitable vulnerabilities before attackers do — delivering findings your dev team can actually fix. Full engagement cycle: recon, exploitation, and a written report both your engineers and executives can act on.
- 12 HTB paths completed
- 658 Targets compromised
- Top 1% HTB ranking
[ SERVICES ]
Services
Remote engagements, clear deliverables, and findings your team can act on.
- BloodHound attack path mapping
- Credential attack simulation
- Written remediation roadmap
- Free re-test after fixes
- Automated + manual validation
- Prioritized remediation report
- Safe for production environments
- Fast turnaround: 3–5 days
- Free re-test after fixes
- External & internal recon
- Vulnerability exploitation & PoC
- Lateral movement & segmentation check
- Written findings report
- Free re-test after fixes
[ CASE STUDIES ]
Redacted Assessment Reports
Real engagements — findings, methodology and remediation guidance, redacted for confidentiality.
SEO Injection & Malware Discovery
Production WordPress site silently compromised. Malicious PHP served gambling content exclusively to Google crawlers — invisible to human visitors — exploiting the client's domain authority to rank illegal content on Search.
- PHP backdoor with Google FCrDNS verification serving casino content to Googlebot — active and undetected on production
- Remote content injection via cURL from attacker-controlled Cloudflare Pages subdomain
- Unrestricted file write on web root — persistent attacker-controlled server-side execution
WordPress Intranet — Static Code Analysis
Full source code review of a private WordPress intranet. 20 vulnerabilities across the codebase, server configuration, and third-party integrations — including hardcoded credentials for external HR and payment systems.
- Hardcoded API credentials for HR and payment systems in source code (CVSS 9.8)
- JWT plugin active with secret key undefined — full authentication bypass vector (CVSS 9.3)
- Stored XSS via unescaped third-party API output · Path traversal in file download handler
[ ABOUT ]
Background
I started as a full-stack developer. That background changes how I test — I know how applications are built, which means I know exactly where developers leave gaps.
My training covers the full offensive attack surface: web exploitation, Active Directory attacks, network pivoting, privilege escalation and incident response. I don't just find vulnerabilities — I explain why they exist, what a real attacker would do with them, and how to fix them correctly.
I work remotely with startups and SMBs across Latin America, the US and Europe. Fixed-price engagements, bilingual delivery, and a free re-test to confirm your fixes actually hold.
[ HOW IT WORKS ]
From first contact to final report
A straightforward engagement cycle designed to minimize disruption and maximize actionable output. Most engagements complete in 1–2 weeks from scoping call to final report.
Free 30-minute call to understand your environment, define targets and agree on rules of engagement. No commitment required.
You receive a written proposal with scope, timeline, methodology and fixed price. NDA signed before any work begins.
Active testing phase. You get progress updates throughout. Any critical findings are reported immediately — no waiting for the final report.
Detailed PDF report with risk ratings, proof-of-concept and remediation steps. Free re-test included to verify fixes were applied correctly.
[ PRICING ]
Price your engagement in 60 seconds
Fill in the details below to get an instant price range. A formal proposal will be sent after a scoping call.
Choose your service
Environment parameters
Scope
Complexity
Testing type
Add-ons (optional)
Selected service
Web App Pentest
Estimated range
Automated estimate only — not a binding quote.
A signed authorization agreement is required before any engagement begins.
[ PROFESSIONAL EXPERIENCE ]
Background & Training
Zeroazul
Full-Stack Developer & Security Specialist · Ongoing
- Web application development using PHP, JavaScript and Node.js with security integrated from the start.
- Network and application security — hardening, vulnerability assessments and secure architecture decisions.
- Linux server administration — deployment, configuration and maintenance of production environments.
HTB Academy — Offensive & Defensive Paths
Penetration Testing & Security Training · 2025
- Completed full penetration testing methodology covering web apps, networks and Active Directory (CPTS path).
- Covered advanced web exploitation techniques including server-side and client-side attacks (CWEE path).
- Trained in SIEM monitoring, DFIR and incident response using Splunk, Elastic Stack and Suricata (CDSA path).
- Trained in professional reporting — translating technical findings into actionable business impact.
[ CERTIFICATIONS ]
Training & Certifications
[ HTB Job Role & Skills Paths Completed ]
External cybersecurity studies
[ FAQ ]
Frequently asked questions
Everything you need to know before booking a scoping call.
Web application penetration testing, Active Directory security assessments, network infrastructure pentests, and vulnerability assessments. All engagements are remote-first, include a detailed PDF report and a free re-test after fixes.
Network penetration testing is an offensive security assessment of your external and internal infrastructure — servers, firewalls, routers, and services — to identify misconfigurations, open ports, exploitable vulnerabilities, and lateral movement paths before a real attacker does.
Pricing depends on scope and complexity. A vulnerability assessment starts from $500 USD, a web app pentest from $3,000, a network pentest from $3,500, and an Active Directory pentest from $5,000. Use the pricing calculator above to get an instant estimate, or book a free scoping call.
Every report includes an executive summary for stakeholders, detailed technical findings with evidence, CVSS risk ratings, reproducible proof-of-concept steps, and prioritized remediation recommendations your dev team can act on immediately. A free re-test is included to verify fixes.
Yes, the scoping call is free and carries no commitment. In 30 minutes we define your environment, agree on targets and rules of engagement, and determine the right service for your needs. You will receive a written proposal with a fixed price afterwards.
Most engagements complete in 1–2 weeks from the scoping call to the final report. A vulnerability assessment can be delivered in 3–5 days. Timeline is agreed and fixed in the written proposal before any work begins.
Yes. I am based in Colombia and fully available for remote engagements worldwide. I work in both English and Spanish. Most engagements are conducted remotely with no disruption to your production environment.
I have completed the CPTS, CDSA, CJCA and CWEE paths on HTB Academy and rank in the Top 1% globally on Hack The Box with 658 targets compromised. I also hold the IBM Cybersecurity Analyst and Google Cybersecurity Professional certificates. You can verify all training via my HTB transcript.
[ SEND A MESSAGE ]