πŸ‘‹ Hello! I’m Suhesh Kasti

feature image

My Cybersecurity Journey

πŸ›‘οΈ You see, I’m almost Batman… but instead of Gotham, I kinda try to save networks (Batman couldn’t either) 🀑.
Cybersecurity has been my passion, and here’s a quick look at what I’ve been doing with it:

  • Learning Ethical Hacking from TCM Security πŸ€“
  • Breaking into Web Applications with Rana Khalil and ITProTV then protecting them with F5 BigIP πŸ› οΈ
  • Scripting like a professional script kiddie with Python For Hackers from TCM Security 🐍
My Cybersecurity Resume
feature image

My DevOps and Networking Knowledge

I challenge you to find a guy who can get stuck like I did on VLANs and subnetting, I’ll wait…. (P.S. I still suck in it πŸ₯Ί) but I am learning using the following resources:

My DevOps Resume
feature image

Current Focus

At the moment, I’m juggling quite a bit (cybersecurity life, amirite?). Here’s what’s on my plate right now:

My Skills & Expertise

Specialized knowledge and capabilities in various cybersecurity domains

Cybersecurity

Penetration Testing

Systematic testing of systems, networks and applications to identify security vulnerabilities that could be exploited by attackers.

Related Topics:
  • Web Application Testing
  • Network Penetration
  • Mobile App Testing
  • API Security Testing
Linux Privilege Escalation

Linux Privilege Escalation

Techniques and methodologies to identify and exploit vulnerabilities that allow attackers to gain elevated access on Linux systems.

Related Topics:
  • SUID/SGID Exploits
  • Sudo Misconfigurations
  • Kernel Exploits
  • Cron Job Abuse

Active Directory

Security assessment and exploitation of Microsoft’s directory service for Windows domain networks.

Related Topics:
  • Domain Privilege Escalation
  • Kerberos Attacks
  • LDAP Enumeration
  • Pass-the-Hash/Pass-the-Ticket

Cloud Security

Protection of cloud-based infrastructure, applications and data from threats, breaches and vulnerabilities.

Related Topics:
  • AWS Security
  • Azure Security
  • Container Security
  • Serverless Security

Malware Analysis

Studying malicious software’s components, behavior and purpose to understand how to detect and defend against it.

Related Topics:
  • Static Analysis
  • Dynamic Analysis
  • Reverse Engineering
  • Memory Forensics

Digital Forensics

Collection, preservation and analysis of digital evidence to investigate incidents and security breaches.

Related Topics:
  • Disk Forensics
  • Memory Analysis
  • Network Forensics
  • Mobile Device Forensics

Programming & Development

Python

Python

Versatile programming language used for scripting, automation, and developing security tools.

Related Topics:
  • Security Automation
  • Tool Development
  • Data Analysis
  • Web Scraping

Bash Scripting

Command-line scripting for automating system administration tasks and security operations.

Related Topics:
  • System Automation
  • Security Scripts
  • Log Analysis
  • Reconnaissance Tools

Web Development

Creating web applications with a focus on security best practices and secure coding principles.

Related Topics:
  • Secure Coding
  • OWASP Top 10
  • Frontend Security
  • Backend Security

Tools & Technologies

Burp Suite

Burp Suite

Comprehensive web vulnerability scanner and proxy tool for security testing of web applications.

Related Topics:
  • Proxy Interception
  • Vulnerability Scanning
  • Intruder Attacks
  • Extension Development
Wireshark

Wireshark

Network protocol analyzer used to examine network traffic and troubleshoot security issues.

Related Topics:
  • Traffic Analysis
  • Packet Inspection
  • Network Forensics
  • Protocol Analysis

Metasploit

Framework for developing, testing, and executing exploits against remote targets.

Related Topics:
  • Exploit Development
  • Post-Exploitation
  • Payload Generation
  • Auxiliary Modules