< what i do >

// what i do

I'm a penetration tester. I scope engagements, find vulnerabilities, exploit them, and write reports that actually explain the business impact to people who aren't technical. My strongest skills are network pentesting, Active Directory, and web application security. I have compromised 550+ targets across Windows, Linux, and AD domains between client engagements and competitive labs. I hold the OSCP+ and CPTS certifications, as well as many other CompTIA certifications.

// My Skills

< Certifications >

// Work Timeline

// 04/2024

< Upwork > |

// Independent Security Consultant

Conduct full-lifecycle penetration testing engagements for clients including scoping, rules of engagement, OSINT reconnaissance, active enumeration, exploitation, and post-exploitation across network and web application environments. • Identify and validate critical vulnerabilities including authentication bypasses, web application flaws, and insecure network segmentation; deliver prioritized remediation roadmaps tailored to client business context • Author commercial-grade penetration testing reports with Executive Summaries, detailed proof-of-concept exploits, CVSS v3.1 risk ratings, and strategic remediation recommendations • Brief both technical and non-technical stakeholders on findings, translating security risks into business impact to drive remediation prioritization Tools: Nmap, Burp Suite, Metasploit, Nessus, Nikto, Python, Bash, Hydra, ffuf

// 01/2024 - Present

< myCyberQuest > |

// Founder & Security Educator

I run study sessions for people breaking into cybersecurity — up to 30 people at a time covering pentest methodology, security fundamentals, and cert prep. I’ve mentored people through their Security+ and A+ exams with a high pass rate. This site is part of that — turning my own learning into content that helps others.

// My Skills

Offensive Security

Network penetration testing, Active Directory exploitation (Kerberoasting, AS-REP roasting, delegation attacks, RBCD, NTLM relay, BloodHound path analysis), web application testing (OWASP Top 10, SQLi, XSS, SSRF, authentication bypass), password attacks, privilege escalation (Windows and Linux), post-exploitation, lateral movement.

Tools

Burp Suite,  Nmap, Metasploit, BloodHound, CrackMapExec/NetExec, Impacket, Responder, Mimikatz, Nessus, Nikto, ffuf, SQLMap, Hashcat, Wireshark, Kali Linux

Reporting & Communication

Commercial-grade pentest reports with executive summaries, proof-of-concept documentation, CVSS v3.1 scoring, and remediation roadmaps. Comfortable briefing both technical and non-technical stakeholders.

HackTheBox

Handle: n0ah77 | Silver Tier | 550+ machines compromised

Competed across Windows, Linux, and Active Directory domains. Focused heavily on AD attack chains including unconstrained delegation, constrained delegation, RBCD, WriteSPN-based Kerberoasting, and the BadSuccessor/dMSA technique.

// My Skills

< Projects>

Some (but not all) of the projects I have completed include:

// Active Directory Enumeration Bible

Comprehensive reference document covering AD enumeration methodology from initial foothold through domain compromise. Structured for use as a field manual during engagements.

// Cloud Honeypot with Azure Sentinel

Deployed a deliberately vulnerable VM in Azure, captured RDP brute-force attempts, geolocated attackers via API, and visualized the data in Azure Sentinel workbooks using KQL.

// Web Application Security Assessment (OWASP Top 10)

Set up a local Juice Shop instance, conducted a full assessment using Burp Suite and manual testing, identified critical vulnerabilities (SQLi, XSS, auth bypass), remediated them in source code, and verified fixes.

More Info

Contact me here 👇

Quick Links

© 2024 Created with Royal Elementor Addons