A Junior Cybersecurity & Information Security Specialist with strong interest in penetration testing, SOC analysis, and protecting systems against cyber threats. I have hands-on experience with Linux, Windows> To stay sharp and relevant, I regularly solve Capture The Flag (CTF) challenges, follow the latest IT and cybersecurity developments, and track newly discovered vulnerabilities. My goal is to grow into a skilled penetration tester and contribute to building more secure environment Outside of cybersecurity, I enjoy reading books, listening to music, gaming, and podcasts, which help me stay balanced and inspired. I see myself as someone committed to making the world a more secure place for the next generation — even if the effort goes unnoticed.
I use Acunetix to analyse websites for potential vulnerabilities so the website can either be attacked or inform the website owner with security solutions.
I use Burp Suite to find vulnerabilities in websites by using their SQL injections, No-Redirect and SSRF tools.
I use Nmap to analyse Website and Server details like Port statuses in order to inform owners about closing ports that can potentially be exploited.
I use Wireshark to analyse incoming network traffic and investigate handshake packets.
I use SQLMap to retrieve Database and Admin Panel information of SQL enabled website.
I'm able to use some powerful set of tools and methods like Airmon-ng, Evil Twin, Bruteforce, Wireshark and Mitm. These allow me to conduct a range of attacks and analysisses on networks, identify vunerabilities and potential entry points for unauthorized access.
I'm able to use multiple techniques in order to attack passwords like Cryptography, Pass-The-Hash, Bruteforce and Phising attacks. These allow me to intercept accounts with the so called secure passwords.
I'm able to use vulnerabilities to my advantage like SQL- and XSS injections, SSRF, No-Redirect, Wordpress vulnerabilities and Web Shells. These allow to gain unauthorized access to Databases, Admin panels and Server Backdoors.
I'm able to use powerful set of tools and methods like DNS Floods, TCP/UDP attacks, Nmap, FTP/SSH attacks and Firewall Bypasses (Nmap). These allow me to gain unauthorized access to servers and clients and put them offline.
My role ensures the secure and seamless operation of IT systems, safeguarding data and infrastructure while enhancing the company’s efficiency, resilience, and productivity.
Enrolled in a part-time Information Security Management program, attending intensive 40-day sessions each year while continuously developing my skills in cybersecurity and risk management.
>While taking the Najot Ta'lim Python Course, I was tested on the following sections
While taking the Haad TC Course, I was tested on the following sections: