Cybersecurity icon
Cybersecurity
Technical Knowledge Intermediate

Summary#

Hands-on experience with both offensive security techniques and defensive countermeasures. Understanding how attacks work at a low level enables building more secure systems. Emphasis on practical exploitation and mitigation strategies.

How I Apply This Skill#

  • Executed buffer overflow attacks with shellcode injection and NOP sleds
  • Exploited SQL injection vulnerabilities for authentication bypass
  • Performed environment variable attacks via PATH manipulation for privilege escalation
  • Implemented SYN flooding attacks to understand DoS mitigation
  • Analyzed AES encryption modes (ECB vs CBC) identifying security implications
  • Generated RSA key pairs using OpenSSL for secure communication
  • Studied defensive countermeasures: ASLR, stack canaries, SYN cookies

Key Strengths#

  • Memory Exploitation: Buffer overflows, stack smashing, shellcode execution
  • Web Security: SQL injection, input validation, authentication bypass
  • Network Attacks: SYN flooding, DoS patterns, TCP/IP vulnerabilities
  • Cryptography: AES modes, RSA key generation, OpenSSL usage
  • Defensive Security: Understanding countermeasures, secure coding practices
← Back to Skills