Welcome to my digital space

πŸ‘‹ Hello! I’m Suhesh Kasti

πŸ”’πŸ’» Your friendly neighbourhood Hackerman πŸ•ΈοΈ

WELCOME TO MY CORNER OF THE INTERNET, FELLOW HUMAN! πŸ‘½

I’m here to share my journey in Cybersecurity and a bit of DevOps through blogs, checklists, and cheat sheets. Need a checklist or cheat sheet to hack the matrix (legally, of course πŸ˜‰)? Get them here at the affordable price of just $FREE.99

  • You can start by exploring blogs I have written and start learning with me β˜•πŸ’»
  • Ready to get your hands dirty?? Use the checklists to be a billion times more efficient πŸŒ€
  • Took a break or got memory like mine? Forgot what and how to do…Worry not use the cheatsheets πŸ”
Profile image
Cybersecurity

My Cybersecurity Journey

feature image

πŸ›‘οΈ You see, I’m almost Batman… but instead of Gotham, I kinda try to save networks (Batman couldn’t either) 🀑.
Cybersecurity has been my passion, and here’s a quick look at what I’ve been doing with it:

Learning Ethical Hacking from TCM Security πŸ€“
Breaking into Web Applications with Rana Khalil and ITProTV then protecting them with F5 BigIP πŸ› οΈ
Scripting like a professional script kiddie with Python For Hackers from TCM Security 🐍
DevOps

My DevOps and Networking Knowledge

feature image

I challenge you to find a guy who can get stuck like I did on VLANs and subnetting, I’ll wait…. (P.S. I still suck in it πŸ₯Ί) but I am learning using the following resources:

Docker containers with Kodekloud Engineer πŸ•
Getting cozy with Networking/CCNA via CBT Nuggets 🌐
Projects

Current Focus

feature image

At the moment, I’m juggling quite a bit (cybersecurity life, amirite?). Here’s what’s on my plate right now:

Grinding away for the F5 101 Exam, because who doesn’t like exams… right? RIGHT??? (SPOILER ALERT: I DON’T 🫠) πŸ“š
Continuing my love affair with Hacking by trying create more of cybersecurity tools. I just made an SSH Bruteforcing tool using python. πŸ”

My Skills & Expertise

Specialized knowledge and capabilities in various cybersecurity domains

Cybersecurity

Penetration Testing

Systematic testing of systems, networks and applications to identify security vulnerabilities that could be exploited by attackers.

Related Topics:
  • Web Application Testing
  • Network Penetration
  • Mobile App Testing
  • API Security Testing
Linux Privilege Escalation

Linux Privilege Escalation

Techniques and methodologies to identify and exploit vulnerabilities that allow attackers to gain elevated access on Linux systems.

Related Topics:
  • SUID/SGID Exploits
  • Sudo Misconfigurations
  • Kernel Exploits
  • Cron Job Abuse

Active Directory

Security assessment and exploitation of Microsoft’s directory service for Windows domain networks.

Related Topics:
  • Domain Privilege Escalation
  • Kerberos Attacks
  • LDAP Enumeration
  • Pass-the-Hash/Pass-the-Ticket

Cloud Security

Protection of cloud-based infrastructure, applications and data from threats, breaches and vulnerabilities.

Related Topics:
  • AWS Security
  • Azure Security
  • Container Security
  • Serverless Security

Malware Analysis

Studying malicious software’s components, behavior and purpose to understand how to detect and defend against it.

Related Topics:
  • Static Analysis
  • Dynamic Analysis
  • Reverse Engineering
  • Memory Forensics

Digital Forensics

Collection, preservation and analysis of digital evidence to investigate incidents and security breaches.

Related Topics:
  • Disk Forensics
  • Memory Analysis
  • Network Forensics
  • Mobile Device Forensics

Programming & Development

Python

Python

Versatile programming language used for scripting, automation, and developing security tools.

Related Topics:
  • Security Automation
  • Tool Development
  • Data Analysis
  • Web Scraping

Bash Scripting

Command-line scripting for automating system administration tasks and security operations.

Related Topics:
  • System Automation
  • Security Scripts
  • Log Analysis
  • Reconnaissance Tools

Web Development

Creating web applications with a focus on security best practices and secure coding principles.

Related Topics:
  • Secure Coding
  • OWASP Top 10
  • Frontend Security
  • Backend Security

Tools & Technologies

Burp Suite

Burp Suite

Comprehensive web vulnerability scanner and proxy tool for security testing of web applications.

Related Topics:
  • Proxy Interception
  • Vulnerability Scanning
  • Intruder Attacks
  • Extension Development
Wireshark

Wireshark

Network protocol analyzer used to examine network traffic and troubleshoot security issues.

Related Topics:
  • Traffic Analysis
  • Packet Inspection
  • Network Forensics
  • Protocol Analysis

Metasploit

Framework for developing, testing, and executing exploits against remote targets.

Related Topics:
  • Exploit Development
  • Post-Exploitation
  • Payload Generation
  • Auxiliary Modules