Turning Challenges into Milestones, One Achievement at a Time
Turning Challenges into Milestones, One Achievement at a Time
I am highly proficient in Linux, with extensive experience in system administration, scripting, and security. My skills include:
Managing and configuring Linux servers (e.g., Ubuntu, CentOS, Debian).
Writing and automating tasks using Bash and Python scripts.
Securing Linux systems through hardening, firewall configuration, and vulnerability management.
Troubleshooting and optimizing system performance for seamless operations.
This expertise has been recognized with a Linux badge from TryHackMe.com, showcasing my hands-on skills and knowledge in Linux environments.
Whether it’s deploying servers, automating workflows, or ensuring robust security, I leverage Linux to deliver efficient and reliable solutions.
I have hands-on experience exploiting the EternalBlue vulnerability (CVE-2017-0144), a critical flaw in Microsoft’s SMB protocol. Using tools like Metasploit, I demonstrated how unpatched Windows systems can be compromised to gain unauthorized access, execute arbitrary code, and escalate privileges.
This exercise was part of my training on TryHackMe.com, where I successfully completed challenges related to EternalBlue. It highlighted the importance of timely system updates and robust patch management in preventing real-world attacks. My work with EternalBlue underscores my ability to identify, exploit, and mitigate vulnerabilities in enterprise environments.
I successfully completed the OhSINT room on TryHackMe.com, which honed my skills in gathering and analyzing publicly available information. Through this exercise, I learned how to:
Extract metadata from images and files.
Use tools like Google Dorking, WHOIS, and social media platforms to uncover hidden information.
Piece together data to build a comprehensive profile of a target.
This experience reinforced the importance of OSINT in cybersecurity, from reconnaissance to threat intelligence, and showcased my ability to leverage open-source tools for effective information gathering.
I successfully completed the Hash Cracker challenges on TryHackMe.com, where I cracked various types of hashes using tools like Hashcat and John the Ripper. This exercise sharpened my skills in:
Identifying hash types (e.g., MD5, SHA-1, bcrypt).
Applying brute-force, dictionary, and rule-based attacks to recover passwords.
Optimizing cracking techniques for efficiency and speed.
This experience highlighted the importance of strong password policies and secure hashing algorithms in protecting sensitive data.
I successfully completed the Mr. Robot room on TryHackMe.com, an immersive CTF challenge inspired by the popular TV series. This exercise tested my skills in:
Enumeration: Identifying open ports, services, and hidden directories.
Exploitation: Gaining access to the system by exploiting vulnerabilities.
Privilege Escalation: Elevating my access to uncover hidden flags.
Persistence: Maintaining access and exploring the system thoroughly.
This challenge not only enhanced my technical skills but also reinforced the importance of thinking like an attacker to strengthen defenses.