Banner Image

Skills

  • Antivirus
  • Application Security
  • Data Security
  • Email Security
  • Ethical Hacking
  • Firewalls
  • Malware Removal
  • Mobile Security
  • Mobile Testing
  • Network Security Testing
  • Penetration Testing
  • Security Testing
  • Software Testing
  • Virus Removal

Services

  • Web Application Security

    $10/hr Starting at $250 Ongoing

    Dedicated Resource

    The Web Application testing would go under 200+ endpoint specific test cases classified into:  Recon Phase  Session Management Testing  Authentication Checks  Code Flaws  Redirection Flaws  Privilege...

    AntivirusApplication SecurityData SecurityEmail SecurityEthical Hacking

About

Securing the Digital World

A dedicated ethical hacker with a voracious appetite for learning new things. Interested in how things function, how they can be broken, and how they can be repaired. Since my school days, I've had a fascination with technology. Beginning with game creation in 12th grade with python programming, I expanded my knowledge as I developed by experimenting with other programming languages and completing numerous technical projects. This eventually led to my fascination with Cyber security and Hacking. I enjoy gathering and disseminating knowledge, as well as creating and finding better ways to do things.

Certifications :-

CNSS (Certified Network Security Specialist)
CCSS (Certified Cyber Security Specialist)
CCNA (Cisco Certified Network Associate)

OUR SOLUTIONS:

Web application security
Mobile application security
Network security
API Security Assessment
Cloud security
AWS Compliance audit
OSINT
Red team assessment
Digital Forensics
ICS/IT/OT audit
Thick client/Thin client
application audit
SOC
Firewall configuration review
Defacement Monitoring
Phishing simulation
Cyber security awareness training
Source code review
Finance Sector Audits ( Swifts,
ATMs, Payment Gateways)
Incident Response
Data Leakage Gap Analysis

Hall-of-Fames:
Apple, Nasa, Microsoft, Paytm, Uber, Huawei, Dell

Bounties:
Nike, Kapsons, Sidefx, Clodcannon, Apple, Swiggy, Clicktime

Work Terms

Phases:
Phase 1 ProjectData Gathering
Phase 2 Reconnaissance Phase
Phase 3 Static Testing (SAST)
Phase 4 Dynamic Testing(DAST)
Phase 5 Runtime Application Self
Protection (RASP)

Project Goals:

Identifying the vulnerabilities in the SOW.
Bypassing the implemented security controls.
Escalating privileges inside the network/hosts.
Accessing the sensitive data.
Data exfiltration using an encrypted channel.

Attachments (Click to Preview)