Profile
While working in a software development role among other roles at a startup, I found a greater interest in offensive security. Apart from my technical capabilities, I have experience in risk analysis, high pressure environments, and playing a role on successful teams.
Education/Certification
Department of Homeland Security Technical Capability Assessment, Level 2, Vulnerability Assessment & Mitigation and Response
Tryhackme top 3%
CompTIA Security+ & PenTest+ - In-Progress (Can be completed w/in 120 days of employment)
Auburn University - Philosophy
Experience
Calibir Inc; Chicago, IL; Active
Goal: give people credit for online learning activity; watching YouTube videos, reading wikipedia, blog posts, or listening to podcasts.
Built and shipped 2 products. A web-app with content upload feature, and text editor for blogs. Then moved to the browser level with a browser extension that could be toggled on/off for learning sessions across multiple platforms.
Hands on w/ equity agreements, investor relations, community outreach, as well as recruiting and interviewing engineering talent.
Student Manager, Auburn University Men’s Basketball; Auburn, AL 2017-2020
Worked in high pressure situations for a team that performed at a championship level while balancing a full class load.
Analyzed risk through cutting & coding film for scout offense and defense, and creating detailed reports for coaches and players.
4 out of 16 managers are on payroll and travel; 1 of the 4. 2019 SEC Champions & 2019 Final Four appearance. 5 players drafted into the NBA.
Tryhackme (student/hacker)
In the top 3% of over 2 million users (see profile here)
Activity oscillates from weekly to daily. Used to learn new methods, tools, and also compete in CTF's.
Practicals
CVE-MS17-010 - Used metasploit to facilitate payload and conduct remote code execution. Used hashdump via the meterpreter shell, collected the hashes of user credentials. Decoded using john the ripper, and then escalated to root privilege.
Social graphing with gephi. Scripting with python. Technical write-up here and GitHub repo here.
MitM attack - intercepted and manipulated communication between a client and server to gain access and perform unauthorized actions. Methods used - DNS spoofing first, and repeated with IP and ARP spoofing. Redirected network traffic through a controlled system. Used Ettercap to facilitate attack and intercept HTTP traffic between targeted systems, bypassing encryption mechanisms.
Network scanning and analysis for at-home remote networks using router settings, nmap, and wireshark for packet filtering. Implemented EDR with bitdefender.
1. Cross-Site Scripting (XSS):
1.1 Conducted comprehensive security assessments to discover XSS flaws, leveraging both manual and automated testing techniques.
1.2 Familiarity with secure coding practices such as input validation, output encoding, and Content Security Policy (CSP) implementation.
2. Cross-Site Request Forgery (CSRF):
2.1 Conducted targeted testing to simulate CSRF attacks, including analyzing the impact of forged requests on application functionality and data integrity.
2.2 Provided recommendations to implement CSRF protection mechanisms such as anti-CSRF tokens, referrer validation, or SameSite cookies.
3. Server-Side Request Forgery (SSRF):
3.1 Expertise in identifying and exploiting SSRF vulnerabilities to manipulate server-side requests.
3.2 Implemented effective mitigation strategies, including input validation, whitelist-based URL filtering, and secure configuration of server components.
4. XML External Entity (XXE) Attacks:
4.1 Proficient in identifying and exploiting XXE vulnerabilities in XML parsing functionality.
4.2 Proposed mitigation techniques such as disabling external entity resolution, implementing strict input validation, or adopting secure XML parsers.
5. Security Misconfigurations:
5.1 Conducted in-depth security assessments to identify common misconfigurations, such as default credentials, exposed sensitive information, or unnecessary open ports.
5.2 Provided detailed recommendations to address misconfigurations, including secure configuration guides, security hardening, and regular configuration audits.
Skills
Security Tools: Nmap, Wireshark, Burp, Hydra, BeEF, John the Ripper, metasploit, sqlmap, nikto are used the most. Can work with plenty more, and can learn plenty more.
Operating Systems/Cloud Providers: Windows, MacOS, Kali Linux, Debian / AWS, Azure