{ . }
Recent computer science graduate, ethical hacker, and passionate life-long learner with offensive security experience in lab environments. Currently using my own penetration testing lab to improve my craft, while also pursuing the CompTIA Security+ and CCNA certifications. Additionally, I possess the following:
- Experience with security tools such as Kali Linux, Metasploit, and Burp Suite.
- Python and shell scripting experience.
- Proficiency in translating technical information to non-technical people (both verbally and in writing).
- Excellent research abilities for finding solutions to problems on my own.
<education>
B.S. Computer Science
The University of The District of Columbia
UDC
Washington, DC
May 2023
<projects>
I'm always working on one or more projects.
NOW
C:\> .
// Ethical Hacker
• Performed reconnaissance, scanning, and enumeration using the following tools:
Nmap, Nessus, OWASP Amass, PowerView, Bloodhound, Airodump-ng, directory busting tools, OSINT tools, and more.
• Performed network penetration testing against Active Directory. Attacks/exploits used include:
EternalBlue (MS17-010), LLMNR poisoning, intercepting hashes, hash cracking, SMB relays, IPv6 DNS takeovers, pass-the-pass, hash dumping, pass-the-hash, token impersonation, Kerberoasting, GPP/cPassword attacks, URL file attacks, PrintNightmare (CVE-2021-1675), credential dumping from memory, Golden Ticket attacks using Mimikatz, ZeroLogon, and more.
• Performed web application penetration testing with an emphasis on the OWASP Top 10 vulnerabilities. Attacks performed include:
SQL injections, XML external entity (XXE) attacks, cross-site scripting (XSS), credential stuffing, password spraying, brute forcing, and more.
• Performed exploit development against a server by identifying a buffer overflow vulnerability and writing a manual Python exploit for it.
• Successfully compromised multiple CTF (capture the flag) machines.
• Currently using the lab to continue experimenting with other new attacks, tools, and tactics.
<experience>
My past relevant work experience.
2017 — Now
C:\> .
// Self-Employed
• Comprehensive website deployment both from scratch and via tools like WordPress.
2021
C:\> .
// Research Assistant
• Performed vulnerability scanning and enumeration in medical network environments.
• Researched security vulnerabilities in CPAP medical machines.
• Researched security vulnerabilities in Internet-of-Things (IoT) networks.
{$}
<contact_me>
Fill out the form below to reach out to me!