Job Seeker Details
Professional Attributes:
- Critical thinker
- Motivated
- Reliable
- Excellent interpersonal skills
Core Competencies:
- I apply the latest and most reliable techniques for enumeration and exploitation of internal and external networks. I do not rely solely on public exploits; I perform thorough enumeration of the domain, users, computers, and privileges to exploit weak security controls, excessive permissions, and policy misconfigurations.
- As an early adopter of Linux (mid 90s), I am proficient in using and exploiting Linux and other Unix- based operating systems.
- Using a social engineering platform built in-house, I create convincing phishing campaigns to entice users to enter their credentials and run a malicious trojan to obtain remote code execution.
- Using C/C++, Ruby, and Bash, I’ve written several tools used by the team for enumeration and exploitation. Most notably, I created a DNS-based command-and-control framework in C++ which has a proven track record of evading modern host-based and network security solutions and egressing the target network. Operators can then perform post-exploitations tasks that often go undetected by using techniques including reflective DLL injection, payload encryption, and sandbox detection.
- Additionally, I’ve contributed numerous modules and bugfixes to the Metasploit Project.
Industry Experience:
Information & Communication Technology
15 Years Experience
Security