{ . }

Recent computer science graduate, ethical hacker, and passionate life-long learner with offensive security experience in lab environments. Currently using my own penetration testing lab to improve my craft, while also pursuing the CompTIA Security+ and CCNA certifications. Additionally, I possess the following:

  • Experience with security tools such as Kali Linux, Metasploit, and Burp Suite.
  • Python and shell scripting experience.
  • Proficiency in translating technical information to non-technical people (both verbally and in writing).
  • Excellent research abilities for finding solutions to problems on my own.
Download my resume here:

<education>

B.S. Computer Science

The University of The District of Columbia

UDC

Washington, DC

May 2023

<projects>

I'm always working on one or more projects.

NOW
// Ethical Hacker

• Performed reconnaissance, scanning, and enumeration using the following tools:
Nmap, Nessus, OWASP Amass, PowerView, Bloodhound, Airodump-ng, directory busting tools, OSINT tools, and more.
• Performed network penetration testing against Active Directory. Attacks/exploits used include:
EternalBlue (MS17-010), LLMNR poisoning, intercepting hashes, hash cracking, SMB relays, IPv6 DNS takeovers, pass-the-pass, hash dumping, pass-the-hash, token impersonation, Kerberoasting, GPP/cPassword attacks, URL file attacks, PrintNightmare (CVE-2021-1675), credential dumping from memory, Golden Ticket attacks using Mimikatz, ZeroLogon, and more.
• Performed web application penetration testing with an emphasis on the OWASP Top 10 vulnerabilities. Attacks performed include:
SQL injections, XML external entity (XXE) attacks, cross-site scripting (XSS), credential stuffing, password spraying, brute forcing, and more.
• Performed exploit development against a server by identifying a buffer overflow vulnerability and writing a manual Python exploit for it.
• Successfully compromised multiple CTF (capture the flag) machines.
• Currently using the lab to continue experimenting with other new attacks, tools, and tactics.

<experience>

My past relevant work experience.

2017 — Now

C:\> .

// Self-Employed

• Comprehensive website deployment both from scratch and via tools like WordPress.

2021

C:\> .

// Research Assistant

• Performed vulnerability scanning and enumeration in medical network environments.
• Researched security vulnerabilities in CPAP medical machines.
• Researched security vulnerabilities in Internet-of-Things (IoT) networks.

{$}

<contact_me>

Fill out the form below to reach out to me!