Cybersecurity Researcher & Certified Penetration Tester
I specialize in identifying vulnerabilities, securing digital infrastructures, and performing deep analysis using tools like Wireshark, Nmap, and Metasploit. With hands-on experience in cyber security and ethical hacking, I am passionate about protecting digital assets and ensuring system resilience.
Certified Penetration Tester
Cyber Security Essentials (LFC108)
Defence Security and Cyber Risk
Penetration Testing & Ethical Hacking
Using exploits to identify and assess security weaknesses during penetration testing.
Wireless penetration testing involving WEP and WPA/WPA2 cracking.
Web Application Security Testing
Scanning, analyzing and mapping networks effectively.
Identifying vulnerabilities and cracking logins to assess security weaknesses in client systems.
Hiding digital content like text, images, videos, or audio to ensure secure communication.
Identifying vulnerabilities in web applications related to session hijacking.
Configuring and managing network firewalls securely.
Using Tails OS, Tor, VPNs, proxies, and fake identities for secure communication.
OSINT: Google dorking, image reversing, geolocation, metadata analysis.
Exploiting system flaws for unauthorized elevated access.
Managing and administering Active Directory, including user accounts, group policies, and domain services.
Proficient in configuring, managing, and monitoring FortiGate firewalls for network security and traffic control.
Skilled in troubleshooting, installing, and maintaining both software and hardware systems for optimal performance.
Knowledgeable in implementing and managing network security measures to protect systems from unauthorized access and cyber threats.