About Me
Aspiring Cybersecurity Engineer with a strong foundation in network security, cryptography, and system protection, along with hands-on experience in Linux System. Proficient in AI and Linux administration. Passionate about securing digital systems,Pentesting Enthusiast.
Aspiring Cybersecurity Engineer with a solid foundation in network security, cryptography, and system protection, complemented by hands-on experience in Linux systems. Skilled in AI concepts and Linux administration, with a practical, problem-solving approach to securing digital environments. A passionate pentesting enthusiast, driven to identify vulnerabilities and strengthen defenses against evolving cyber threats. Continuously learning and adapting to stay ahead in the ever-changing cybersecurity landscape.
What I'm Doing
- Gobuster Finds hidden directories, files, and subdomains
- Amass Discovers subdomains and attack surfaces
- theHarvester Collects emails, domains, and metadata
- Nmap Discovers hosts and services on a network
- Wireshark Analyzes network traffic for security issues
- Burp Suite Used for testing web application security
- Metasploit Framework to simulate cyber attacks and exploit vulnerabilities
- Core Algorithms RSA, AES, ECC
- Quantum Threats Shor’s Algorithm (breaks RSA/ECC), Grover’s Algorithm (affects symmetric crypto)
- Post-Quantum Lattice-based, Hash-based signatures, Code-based cryptography
- Wireshark GUI tool for deep packet inspection and protocol analysis
- tcpdump Lightweight CLI tool for capturing and filtering live traffic
- Snort Detects suspicious traffic patterns using rule-based signatures
- IDS/IPS Deploy systems like Snort and Suricata for real-time alerts
- Burp Suite Intercepts HTTP/S traffic, modifies requests, automates vulnerability scans
- OWASP ZAP Finds common web vulnerabilities like XSS and SQL injection
- Metasploit Used to exploit discovered vulnerabilities and simulate attacks
- sqlmap Automates detection and exploitation of SQL injection flaws
- Nikto Scans for outdated software, misconfigurations, and known vulnerabilities
- Autopsy Analyzes disk images, recovers files, and handles timeline analysis
- FTK Advanced commercial tool for deep forensic investigations