Dedicated and skilled cybersecurity professional with over 5 years of experience specializing in red team operations, computer network exploitation, and incident response.
Background
Penetration Testing | Red Team Operator
Specializations
5 Years of Experience
Skills
Expertise
Technical Proficiency:
Operating Systems:
Windows
macOS
Linux (Ubuntu, Kali)
Scripting:
Bash, PowerShell
Programming Languages:
Python
Java
C++
SQL
HTML
Virtualization:
VMware
VMware hypervisor
Security Tools:
Kibana
Scout Suit
Nikto
Nessus
Nord Locker
Wireshark
TrueCrypt
Intruder
OS Recon
PowerShell-Empire
Burp Suite
Security Methodologies:
Red Team
OSINT (Open-source intelligence)
OWASP Top 10
Investigation
Offensive Security:
Preparation and Planning
Gaining Access
Active Attacks (Online and Infrastructure)
Covering Tracks
Scanning and Enumeration
Credential Obtaining
Administrative Access and Privilege Escalation
Passive Online Attacks
Defensive Security:
Covering Up Access
Defending Systems and Devices
Implementing Defensive Systems
Content Discovery
HTTP/S in Detail
SNS (Social Networking Services) in Detail
Backdoor Access
Security Testing Tools:
Hydra
RustScan
Ffuf
Shodan
Incident Response & Digital Forensics:
Mitre Endpoint Incident Triage & Response
Report Preparation
XSS, CSRF, SSRF, SQLi
Remediation Activities
Identity Access Management
Reconnaissance
Risk Assessment
Enterprise Web Proxy Solutions
Information Security Solutions
Security Best Practices
Security Infrastructure Management:
Technical Support
Log Review
Cloud/Network Security
Firewall Management
Security Upgrades
Security Information & Event Management (SIEM)
Active Directory
Security Testing:
DAST (Dynamic Application Security Testing)
SAST (Static Application Security Testing)
Operating System Detection
Cryptography:
Cryptography Fundamentals
Identity and Access Management (IAM):
Access Control
Additional Security Expertise:
Memory Corruption
Deep Links
Governance & Compliance:
Artificial Intelligence in Security
Cloud-Based Architecture
Insecure Storage
Security Best Practices
SQL | SQLite database
Python serves as a powerful ally for red team operators, providing a versatile and efficient scripting language that enhances their capabilities in various aspects of cyber operations. Its simplicity and readability make it ideal for rapid development of custom tools and exploits tailored to specific targets. Python's extensive libraries, such as Scapy for packet manipulation and Requests for HTTP interactions, facilitate the creation of sophisticated attack scripts. Additionally, its cross-platform compatibility ensures that tools developed in Python can seamlessly run across different operating systems, increasing flexibility in diverse target environments. The language's integration capabilities with other languages and frameworks further enhance its utility, enabling red team operators to seamlessly incorporate Python scripts into broader attack scenarios. Overall, Python empowers red team operators with a robust toolset, enabling them to craft efficient, tailored solutions for probing and assessing target systems during simulated adversarial engagements.
Projects
C++ snake game
Java 7up/7down game
Python BlackJack game
Welcome to the certification section of our website. Here, you will find all my certification badges displayed in a well-organized manner. Browse through the badges to learn more about my expertise and qualifications.
My Background
Background
Oracle Cloud Data Management 2023 Certified Foundations Associate
TestOut Linux Pro
TestOut CyberDefense Pro
TestOut Network Pro
TestOut Pc Pro
TestOut Security Pro
TestOut Ethical Hacking Pro
Oracle Cloud Infrastructure 2023 AI Certified Foundations Associate
Oracle Cloud Infrastructure 2023 Certified Foundations Associate
I will Obtain this Certification on 03/29/2024