Cybersecurity Portfolio

DANIEL ORDONEZ ARANGO

Daniel Ordonez Arango — Penetration Tester

Daniel Ordonez Arango

Available for engagements

Penetration tester specialized in web apps & Active Directory.

I help startups and SMBs find exploitable vulnerabilities before attackers do — delivering findings your dev team can actually fix. Full engagement cycle: recon, exploitation, and a written report both your engineers and executives can act on.

Web Pentest
Networks
Active Directory
Network
  • 12 HTB paths completed
  • 658 Targets compromised
  • Top 1% HTB ranking

Services

Remote engagements, clear deliverables, and findings your team can act on.

🌐 Web Application Pentest Find exploitable vulnerabilities in your app before a breach does. OWASP-aligned manual testing with a written report your team can act on immediately.
  • OWASP Top 10 manual testing
  • PDF report with risk rankings
  • Remediation recommendations
  • Free re-test after fixes
🏚 Active Directory Pentest Identify attack paths through your internal network before a threat actor does. BloodHound mapping, credential attacks, and a clear remediation roadmap.
  • BloodHound attack path mapping
  • Credential attack simulation
  • Written remediation roadmap
  • Free re-test after fixes
🔍 Vulnerability Assessment Automated + manual scan of your attack surface with validated findings and a prioritized remediation report. A lower-cost entry point before a full pentest.
  • Automated + manual validation
  • Prioritized remediation report
  • Safe for production environments
  • Fast turnaround: 3–5 days
  • Free re-test after fixes
🌐 Network Pentest Map your external and internal attack surface, exploit network vulnerabilities, and receive a prioritized remediation report before a real attacker does.
  • External & internal recon
  • Vulnerability exploitation & PoC
  • Lateral movement & segmentation check
  • Written findings report
  • Free re-test after fixes

Redacted Assessment Reports

Real engagements — findings, methodology and remediation guidance, redacted for confidentiality.

Web Application · Black-Box
1 Critical 3 High 10 findings

SEO Injection & Malware Discovery

Production WordPress site silently compromised. Malicious PHP served gambling content exclusively to Google crawlers — invisible to human visitors — exploiting the client's domain authority to rank illegal content on Search.

  • PHP backdoor with Google FCrDNS verification serving casino content to Googlebot — active and undetected on production
  • Remote content injection via cURL from attacker-controlled Cloudflare Pages subdomain
  • Unrestricted file write on web root — persistent attacker-controlled server-side execution
View redacted report →
WordPress · Static Analysis
5 Critical 6 High 20 findings

WordPress Intranet — Static Code Analysis

Full source code review of a private WordPress intranet. 20 vulnerabilities across the codebase, server configuration, and third-party integrations — including hardcoded credentials for external HR and payment systems.

  • Hardcoded API credentials for HR and payment systems in source code (CVSS 9.8)
  • JWT plugin active with secret key undefined — full authentication bypass vector (CVSS 9.3)
  • Stored XSS via unescaped third-party API output · Path traversal in file download handler
View redacted report →

Background

I started as a full-stack developer. That background changes how I test — I know how applications are built, which means I know exactly where developers leave gaps.

My training covers the full offensive attack surface: web exploitation, Active Directory attacks, network pivoting, privilege escalation and incident response. I don't just find vulnerabilities — I explain why they exist, what a real attacker would do with them, and how to fix them correctly.

I work remotely with startups and SMBs across Latin America, the US and Europe. Fixed-price engagements, bilingual delivery, and a free re-test to confirm your fixes actually hold.

Remote-first Available for engagements worldwide — no travel overhead
Bilingual Engagements and reports in English and Spanish
Fixed price Agreed in writing before any work begins — no surprises
Free re-test Included with every engagement to verify fixes hold
NDA before day one Signed prior to any access, scope or technical discussion

From first contact to final report

A straightforward engagement cycle designed to minimize disruption and maximize actionable output. Most engagements complete in 1–2 weeks from scoping call to final report.

01
Scoping Call

Free 30-minute call to understand your environment, define targets and agree on rules of engagement. No commitment required.

02
Proposal & NDA

You receive a written proposal with scope, timeline, methodology and fixed price. NDA signed before any work begins.

03
Engagement

Active testing phase. You get progress updates throughout. Any critical findings are reported immediately — no waiting for the final report.

04
Report & Re-test

Detailed PDF report with risk ratings, proof-of-concept and remediation steps. Free re-test included to verify fixes were applied correctly.

Price your engagement in 60 seconds

Fill in the details below to get an instant price range. A formal proposal will be sent after a scoping call.

01

Choose your service

02

Environment parameters

Scope

Complexity

03

Testing type

04

Add-ons (optional)

Selected service

Web App Pentest

Estimated range

$3,000 $6,000 USD
Scope Small · 1–5 targets
Complexity Standard
Testing Black-box
Book a free scoping call

Automated estimate only — not a binding quote.
A signed authorization agreement is required before any engagement begins.

Background & Training

01

Zeroazul

Full-Stack Developer & Security Specialist · Ongoing

  • Web application development using PHP, JavaScript and Node.js with security integrated from the start.
  • Network and application security — hardening, vulnerability assessments and secure architecture decisions.
  • Linux server administration — deployment, configuration and maintenance of production environments.
02

HTB Academy — Offensive & Defensive Paths

Penetration Testing & Security Training · 2025

  • Completed full penetration testing methodology covering web apps, networks and Active Directory (CPTS path).
  • Covered advanced web exploitation techniques including server-side and client-side attacks (CWEE path).
  • Trained in SIEM monitoring, DFIR and incident response using Splunk, Elastic Stack and Suricata (CDSA path).
  • Trained in professional reporting — translating technical findings into actionable business impact.

Training & Certifications

Web Penetration Tester Web recon, exploitation, APIs and professional reporting.
Penetration Tester Methodology, enterprise assessments, exploitation and reporting.
SOC Analyst Monitoring, SIEM, traffic analysis, DFIR and reporting.
Active Directory Enumeration In-depth AD enumeration techniques, tools and attack surface mapping. Hard difficulty path.
Information Security Foundations Core InfoSec concepts: networking, cryptography, pentesting methodology and career foundations.
Operating System Fundamentals Windows and Linux internals, administration and hardening in line with security best practices.
Local Privilege Escalation Manual and tool-assisted privilege escalation techniques on Windows and Linux systems.
Intro to Binary Exploitation Buffer overflows, shellcode and exploit scripting. Hard difficulty path.
View HTB Transcript →

External cybersecurity studies

IBM Cybersecurity Analyst Professional Certificate Professional Certificate · V2 · Credly verified
Google Cybersecurity Professional Certificate Professional Certificate · V2 · Credly verified
Verify on Credly →

Frequently asked questions

Everything you need to know before booking a scoping call.

Web application penetration testing, Active Directory security assessments, network infrastructure pentests, and vulnerability assessments. All engagements are remote-first, include a detailed PDF report and a free re-test after fixes.

Network penetration testing is an offensive security assessment of your external and internal infrastructure — servers, firewalls, routers, and services — to identify misconfigurations, open ports, exploitable vulnerabilities, and lateral movement paths before a real attacker does.

Pricing depends on scope and complexity. A vulnerability assessment starts from $500 USD, a web app pentest from $3,000, a network pentest from $3,500, and an Active Directory pentest from $5,000. Use the pricing calculator above to get an instant estimate, or book a free scoping call.

Every report includes an executive summary for stakeholders, detailed technical findings with evidence, CVSS risk ratings, reproducible proof-of-concept steps, and prioritized remediation recommendations your dev team can act on immediately. A free re-test is included to verify fixes.

Yes, the scoping call is free and carries no commitment. In 30 minutes we define your environment, agree on targets and rules of engagement, and determine the right service for your needs. You will receive a written proposal with a fixed price afterwards.

Most engagements complete in 1–2 weeks from the scoping call to the final report. A vulnerability assessment can be delivered in 3–5 days. Timeline is agreed and fixed in the written proposal before any work begins.

Yes. I am based in Colombia and fully available for remote engagements worldwide. I work in both English and Spanish. Most engagements are conducted remotely with no disruption to your production environment.

I have completed the CPTS, CDSA, CJCA and CWEE paths on HTB Academy and rank in the Top 1% globally on Hack The Box with 658 targets compromised. I also hold the IBM Cybersecurity Analyst and Google Cybersecurity Professional certificates. You can verify all training via my HTB transcript.

Direct message