Ability to exploit recognized vulnerabilities and also discover new vulnerabilities.
Pentesting Mobile Application by Reverse Engineering and testing the application dynamic functionality
Analyzing and auditing the Source code of the Web/Mobile Application.
Proficient in Linux operating system configuration, utilities and programming, Conducted manual external
and internal penetration testing.
Solid understanding of information security and applied cryptographic protocols. Proficiency in scripting,
Unix operating systems and windows.
Network vulnerability scan and penetration testing
Real-time traffic analysis, network IDS and packet
dissection using WireShark.
Network Pentesting
Kali Linux
JavaScript
Python
Vulnerability Assessment
Ethical Hacking