Technical
Technical
Summary: Configured ELK Stack, Filebeat, and Metricbeat deployments for a virtual Cloud network.
Languages: YAML, Bash
Tools: Ansible, Docker, Azure
Summary: Analyzation of a simulated casino database of dealers and players to identify the perpetrators of company loss.
Languages: Bash
Summary: Red Team/Blue Team pentest simulation.
Languages: nmap, Metasploit, Hydra, Crackstation, ELK, Packetbeat
Summary: Backdoor exploitation using Ubuntu Linux.
Role: Pentester
Languages: Bash
Tools: SSH, John the Ripper, privilege escalation
Summary: A vulnerability report exploiting Icecast, using the Cyber Kill Chain.
Tools: Meterpreter, nmap