Welcome, my name is Daniel Feichter and I am the founder of the cyber security / IT security company RedOps. As the name suggests, RedOps is an abbreviation of the term Red Team Operations, which originally comes from the US military. With RedOps, as an ethical hacker in IT security, I focus on benign hacking services with a specialisation in offensive security / red teaming services in the area of Windows OS / Microsoft Active Directory. 

A large part of my time is dedicated to education and research. My focus is on Windows Internals, Antivirus (AV), Endpoint Protection (EPP) and Endpoint Detection and Response (EDR). I have had the opportunity to present my findings in the form of a talk or workshop at the following prestigious IT security conferences.


In addition, I am continuously dedicated to professional development. If you would like to find out more about my skills and experience, please visit the "About me" section or my LinkedIn profile. Among others, I have obtained the following certifications to date. 

  • OffSec Certified Professional (OSCP)


I am also listed as a contributor to the MITRE ATT&CK framework with the following sub-techniques. 

Expertise

Penetration testing with a good methodology is extremely important. However, I am convinced that this alone is not enough to prepare companies for real cyber attacks and build strong cyber resilience in the long term.

  • RedOps Training

    Apart from offensive security, my greatest passion is teaching and sharing practical knowledge in the field of IT security. I was able to demonstrate my expertise at the Red Team Village at DEF CON 31.

    More
  • Red Team Approach

    Penetration Testing is not the same as Red Teaming! The Red Team Approach or Red Teaming tool has a different added value and is not limited to the purely technical analysis of your IT security.

    More
  • Penetration Testing

    Penetration testing focuses on the technical analysis of your IT infrastructure. The pentest report forms the basis for a subsequent, effective hardening process of your IT infrastructure.

    More
  • Assumed Breach

    In the Assumed Breach scenario, we assume that a malicious attacker has already gained access to your internal network. For example, the classic trainee scenario.

    More
  • Egress / C2-Test

    Many companies still focus on perimeter defence, but in practice, attacks from within are becoming increasingly important.

    More

Apart from offensive security, my greatest passion is teaching and sharing practical knowledge in the field of IT security. I was able to demonstrate my expertise at the Red Team Village at DEF CON 31.

More

Penetration Testing is not the same as Red Teaming! The Red Team Approach or Red Teaming tool has a different added value and is not limited to the purely technical analysis of your IT security.

More

Penetration testing focuses on the technical analysis of your IT infrastructure. The pentest report forms the basis for a subsequent, effective hardening process of your IT infrastructure.

More

In the Assumed Breach scenario, we assume that a malicious attacker has already gained access to your internal network. For example, the classic trainee scenario.

More

Many companies still focus on perimeter defence, but in practice, attacks from within are becoming increasingly important.

More

Ethical hacking is where I find my professional fulfilment and I want to share my enthusiasm for IT security with others and use my expertise to make the digital world a little safer.

Ing. Daniel Feichter B.Sc., Founder RedOps
Services offered

With services in the area of IT security / offensive security, I have made my passion my core competence. I do not sell products or licences and I am 100% integer in what I do.

  • Security
    IT-Security
    I support you on the one hand in improving your technical IT security and on the other hand in developing your internal defenders. My goal is sustainable customer relationships with strong cyber resilience as a result.
  • Beratung
    Consulting
    Different companies mean individual starting points and requirements. That's why individual IT security concepts are necessary. I help you to find the right concept.
  • Vorträge
    Lectures
    To raise awareness of information security and anchor it in the minds of your employees, I offer live hacking and lectures in which I demonstrate how hacking works in a practical way.
  • Forschung
    Research
    IT security is not a product, but a constant learning process. That's why I invest a lot of time in further education and research. I have already presented my results at several international IT security conferences.
Security
IT-Security
I support you on the one hand in improving your technical IT security and on the other hand in developing your internal defenders. My goal is sustainable customer relationships with strong cyber resilience as a result.
Beratung
Consulting
Different companies mean individual starting points and requirements. That's why individual IT security concepts are necessary. I help you to find the right concept.
Vorträge
Lectures
To raise awareness of information security and anchor it in the minds of your employees, I offer live hacking and lectures in which I demonstrate how hacking works in a practical way.
Forschung
Research
IT security is not a product, but a constant learning process. That's why I invest a lot of time in further education and research. I have already presented my results at several international IT security conferences.
Let's talk about...
  • Information Security
  • Offensive Security
  • Ethical Hacking
  • Cyber Security
  • Endpoint Security
Let's talk about your IT security! I will be happy to spend time with you to discuss your options in a free initial consultation.
What I stand for

With my commitment to Offensive Security / Red Teaming Services, I stand for quality and independence with my company RedOps. I live the philosophy of lifelong learning and research.

Responsibility Research Quality
  • Responsibility and Integrity

    Anyone who uses offensive security services and deliberately exposes themselves to an ethical hacking attack should do so with a partner they can absolutely trust. I keep all information strictly confidential and am 100% integer in what I do.

  • Research Orientation

    IT security is not a product, but a constant learning process. That's why I invest a lot of time in further education and research. I have already been able to present my results in the area of endpoint security at several international IT security conferences.

  • Quality Instead of Quantity

    With Offensive Security, I have made my passion my core competence. I don't sell products or licences, but live purely from my expertise in the field of IT security. For me, quality clearly comes before quantity.