About
I excel in Web-app security, Mobile app security, API security, Vulnerability Assessment & Penetration Testing. Proficient in tools like Burp Suite, Acunetix, Nessus, IBM AppScan, Terraform, Ansible, Prometheus, Nmap, Pentest tools, Frida, Drozer, and Kali Linux. Skilled in uncovering a variety of vulnerabilities including account takeover, injections, privilege escalation, series of vulnerabilities leading to account takeover, LFI, XSS, OWASP Top 50, and more.
Skills & Expertise (27)
Work Experience
Junior Penetration Tester
EncodersPro
Mar 2024 - Aug 2024
Assisting in Penetration Testing: Conducted in-depth security assessments by simulating real-world attack scenarios to uncover potential vulnerabilities in applications and systems. Vulnerability Assessment: Evaluated systems and applications to identify and categorize vulnerabilities, offering actionable insights to mitigate security risks. Reporting and Documentation: Created comprehensive reports outlining security vulnerabilities, steps to reproduce, impact analysis, and recommendations for remediation. Incident Response Support: Assisted in the investigation and resolution of security incidents by providing technical analysis and implementing countermeasures to minimize damage. Offensive Security Tools Usage: Leveraged a variety of security tools like Burp Suite, Metasploit, and Nmap to conduct security tests and gather crucial intelligence for vulnerability exploitation.
Freelance Penetration Testing
Huntresslabs
Jan 2024 - Feb 2024
Project Planning and Scope Definition: Collaborated with stakeholders to define the scope, objectives, and key deliverables of the penetration testing project. Vulnerability Assessment and Threat Hunting: Utilized Huntress Labs' platform to perform deep analysis and continuous monitoring of the network for advanced persistent threats (APTs) and hidden vulnerabilities. Penetration Testing: Executed network and application penetration tests, employing tools such as Metasploit, Burp Suite, and custom scripts. Reporting and Documentation: Compiled detailed reports of identified vulnerabilities, including technical descriptions, potential impacts, and suggested remediation strategies.
Education
Bachelor of Computer Applications - Poornima University
2021 - 2024 · Afghanistan