Offensive security in full-service firms, boutiques and legal departments handling sensitive cases.
Why now
Law practice deals with attorney-client privilege. Leaks of M&A processes, billion-dollar litigation or criminal cases can void deals, expose strategy to opposing counsel and risk OAB and client exposure. Boutiques are preferred targets — high-value data, low security maturity.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Repository for case files, contracts, opinions and strategy.
Tikal, ASTREA, integration with courts and OAB.
Email, encrypted messaging, client portal.
Notebook, mobile, loss/theft, OneDrive/Drive corporate.
Hardening against motivated adversary, OPSEC, encrypted communication.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
Engagements with full-service firms and boutiques.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes. Reinforced NDA, air-gapped environment when required, zero data retention after engagement closure.
Yes. OPSEC hardening, encrypted communication, protection against directed adversary.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.