I'm a penetration tester. I scope engagements, find vulnerabilities, exploit them, and write reports that actually explain the business impact to people who aren't technical. My strongest skills are network pentesting, Active Directory, and web application security.
I have compromised 550+ targets across Windows, Linux, and AD domains between client engagements and competitive labs. I hold the OSCP+ and CPTS certifications, as well as many other CompTIA certifications.
// My Skills
< Certifications >
// Work Timeline
// 04/2024
< Upwork >|
// Independent Security Consultant
Conduct full-lifecycle penetration testing engagements for clients including scoping, rules of engagement, OSINT reconnaissance, active enumeration, exploitation, and post-exploitation across network and web application environments.
• Identify and validate critical vulnerabilities including authentication bypasses, web application flaws, and insecure network segmentation; deliver prioritized remediation roadmaps tailored to client business context
• Author commercial-grade penetration testing reports with Executive Summaries, detailed proof-of-concept exploits, CVSS v3.1 risk ratings, and strategic remediation recommendations
• Brief both technical and non-technical stakeholders on findings, translating security risks into business impact to drive remediation prioritization
Tools: Nmap, Burp Suite, Metasploit, Nessus, Nikto, Python, Bash, Hydra, ffuf
// 01/2024 - Present
< myCyberQuest >|
// Founder & Security Educator
I run study sessions for people breaking into cybersecurity — up to 30 people at a time covering pentest methodology, security fundamentals, and cert prep. I’ve mentored people through their Security+ and A+ exams with a high pass rate. This site is part of that — turning my own learning into content that helps others.
// My Skills
Offensive Security
Network
penetration testing, Active Directory exploitation (Kerberoasting, AS-REP
roasting, delegation attacks, RBCD, NTLM relay, BloodHound path analysis), web
application testing (OWASP Top 10, SQLi, XSS, SSRF, authentication bypass),
password attacks, privilege escalation (Windows and Linux), post-exploitation,
lateral movement.
Tools
Burp Suite, Nmap, Metasploit, BloodHound, CrackMapExec/NetExec, Impacket, Responder,
Mimikatz, Nessus, Nikto, ffuf, SQLMap, Hashcat, Wireshark, Kali Linux
Reporting & Communication
Commercial-grade
pentest reports with executive summaries, proof-of-concept documentation, CVSS
v3.1 scoring, and remediation roadmaps. Comfortable briefing both technical and
non-technical stakeholders.
Competed across
Windows, Linux, and Active Directory domains. Focused heavily on AD attack
chains including unconstrained delegation, constrained delegation, RBCD,
WriteSPN-based Kerberoasting, and the BadSuccessor/dMSA technique.
// My Skills
< Projects>
Some (but not all) of the projects I have completed include:
// Active Directory Enumeration Bible
Comprehensive reference document covering AD enumeration methodology from initial foothold through domain compromise. Structured for use as a field manual during engagements.
// Cloud Honeypot with Azure Sentinel
Deployed a deliberately vulnerable VM in Azure, captured RDP brute-force attempts, geolocated attackers via API, and visualized the data in Azure Sentinel workbooks using KQL.
// Web Application Security Assessment (OWASP Top 10)
Set up a local Juice Shop instance, conducted a full assessment using Burp Suite and manual testing, identified critical vulnerabilities (SQLi, XSS, auth bypass), remediated them in source code, and verified fixes.