Offensive security in academic systems, online learning, research, digital library and teaching-hospital records.
Why now
Higher-ed institutions hold data on thousands of students, confidential research, IP and — in some cases — teaching-hospital records. A breach hits financials, ProUni/FIES, the Ministry of Education and research partners.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Enrollment, transcripts, grade entry, FIES/ProUni integration.
Moodle, Canvas, LTI integration, online exams, academic anti-fraud.
Institutional repository, research data, private datasets.
Access to paid journals, IP control, CAFe federation.
When applicable, EHR, hospital systems and patient data.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
Engagements with public and private higher-ed institutions in Brazil and Portugal.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes. IdP audit, released attributes, Shibboleth federation and SP-IdP security.
Yes. We combine academic pentest with audit of the teaching hospital's EHR.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.