Hello I'm

E1u5iv3F0x

Penetration Tester

About Me

Hello, I am young and ambitious IT student. I have some experience in Penetration Tests & Red Teaming. Also I am good at:

  • Computer Networks
  • Linux
  • Windows
  • PowerShell
  • Bash
  • Git
  • Python
  • Java
  • Android
  • PHP
  • SQL
  • HTML
  • CSS
  • JavaScript
  • Wi-Fi
  • SOAP
  • REST
  • OSINT
  • Cryptography
  • Phishing
  • Digital Forensics

Featured Posts

Topic 1.

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout

Read More

Topic 2.

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout

Read More

Topic 3.

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout

Read More

What I can do

Red Teaming

Red Teaming is a step above traditional penetration (pen) testing by simulating real-world attacks by replicating the Techniques, Tactics and Procedures (TTPs) of real-world adversaries.

Web Application & API Penetration Testing

Web application penetration testing works by using manual or automated penetration tests to identify any vulnerability, security flaws or threats in a web application. The tests involve using/implementing any of the known malicious penetration attacks on the application. The penetration tester exhibits/fabricates attacks and environment from an attackers perspective, such as using SQL injection tests. The web application penetration testing key outcome is to identify security weakness across the entire web application and its components. It also helps in prioritizing the identified vulnerabilities and threats, and possible ways to mitigate them.

Network Infrastructure Penetration Testing

An infrastructure penetration test is a proven method of evaluating the security of computing networks and infrastructure weaknesses. These kinds of tests aim to identify vulnerabilities and risks in the network which may impact the Confidentiality, Integrity, and Availability (CIA) triad of data by simulating a real-world attack.

Wi-Fi Penetration Testing

Wi-Fi penetration testing is one way to identify gaps within your existing networks and implement corrective actions to mitigate those risks. This is generally a straightforward process which can be particularly cost-effective when combined with existing internal penetration test efforts.

Thick Client Penetration Testing

Thick client penetration testing involves both local and server-side processing and often uses proprietary protocols for communication.

Android Application Penetration Testing

Android Penetration Testing is a process of testing and finding security issues in an android application. It involves testing 6 key areas in mobile app security: Local Data Storage, Communication with Trusted Endpoints, Authentication and Authorization, Interaction with the Mobile Platform, Code Quality and Exploit Mitigation and Anti-Tampering and Anti-Reversing.

Operating System Hardening & Auditing

Hardening of the OS is the act of configuring an OS in a secure manner, updating it, creating rules and policies to help govern the system in a secure manner, and removing unnecessary applications and services. This is done to minimize a computer OS's exposure to threats and to mitigate possible risk.

Database Securing & Hardening

Database auditing is the monitoring and recording of selected user database actions. It can be based on individual actions, such as the type of SQL statement executed, or on combinations of factors that can include username, application, time, and so on. Security policies can trigger auditing when specified elements in an Oracle database are accessed or altered, including the contents within a specified object.

Java & PHP Secure Code Review

A secure code review is a specialized task involving manual and/or automated review of an application's source code in an attempt to identify security-related weaknesses (flaws) in the code. A secure code review does not attempt to identify every issue in the code, but instead looks to provide insight into what types of problems exist and to help the developers of the application understand what classes of issues are present.

Acquired Certificates

Offensive Security Certified Professional
Credential ID OS-101-20274

Issued Nov 2019. No Expiration Date

eLearnSecurity Web application Penetration Tester eXtreme
Credential ID 9804220

Issued Aug 2020 No Expiration Date

eLearnSecurity Mobile Application Penetration Tester
Credential ID 6383476

Issued Mar 2020. No Expiration Date

eLearnSecurity Web application Penetration Tester
Credential ID 9708548

Issued Mar 2020. No Expiration Date

Work Experience

Penetration Tester at STM Solutions

Since Jun 2019
  • Security tests of applications, IT systems and other elements of IT infrastructure of STM Solutions clients
  • Performing analysis of incidents and misconducts in the tested scope of IT security area
  • Creating and developing reports on the work carried out

Intern at STM Solutions

Sep 2018 Jan 2019
  • Studying penetration testing methodologies
  • Learning to create and develop clean reports on the work carried out

Intern at Infonetmedia Ltd

May 2018 Jun 2018
  • Exploitation, preservation and repair of computer and peripheral devices
  • Designing local computer networks and network administration
  • Creating web applications and databases, and administering databases