WebApp Exploit Lab
Built a vulnerable e-commerce app in a local lab and documented exploit chain + hardening checklist.
Hello! I am a Computer Science student pursuing a career in offensive cyber security. (Most of the data listed below on this website is simply mock data to fill out in the future).
I am a computer science student focused on penetration testing and red teaming. I like building VM Labs, and expoiting them in different ways. I am also capable of scripting in multiple computing languages, including Python, Bash, PowerShell, JavaScript, Ruby, and SQL.
Built a vulnerable e-commerce app in a local lab and documented exploit chain + hardening checklist.
Built a vulnerable GraphQL checkout API and exploited introspection/injection/mutation.
Exploited Kerberos authentication to obtain service tickets and escalate privileges to Domain Admin.
Extracted and reverse-engineered camera firmware to find an unauthenticated telnet/debug backdoor and PoC remote control; includes firmware hardening steps.
Developed a proof-of-concept exploit for the EternalBlue vulnerability in SMBv1, allowing for remote code execution on vulnerable Windows machines.
Exploited a server-side template injection vulnerability to achieve remote code execution.
Conducted a replay attack on a Zigbee-enabled door lock to unlock it without authorization.
Exploited a misconfigured Helm chart to escalate privileges within a Kubernetes cluster.
Relayed captured NTLM auth to an AD CS enrollment service to obtain a forged machine certificate and gain domain access.
Gained unauthorized access to an MQTT broker and manipulated IoT devices connected to it.
Exploited a misconfigured Azure Storage account to obtain a SAS token with elevated privileges.
Conducted a SQL injection attack to extract sensitive product information from the database.
Feel free to reach out for collaborations, inquiries, or just to say hello!