Offensive Security Portfolio

DANIEL ORDONEZ ARANGO

Penetration tester with experience across web applications, networks and incident response.

I work across web applications, networks and systems with an offensive and defensive mindset, translating technical findings into documentation teams can actually use to improve security posture.

  • 11 HTB paths completed
  • 644 Targets compromised
  • Top 1% HTB ranking

Profile briefing

I combine offensive security testing with defensive analysis to assess and improve the resilience of organizations. My work spans systems, applications and networks with a practical security focus.

I focus not only on finding issues, but also on documenting meaningful findings clearly, turning technical discoveries into actionable security improvements for both technical and operational teams.

Attack surface coverage

Web Applications Networks Local Systems Defensive Analysis Secure Development Context Documentation Reporting Remediation Support

Why this profile stands out

Offensive + Defensive Context I assess weaknesses with an attacker mindset while keeping remediation and security posture in view.
Application + Infrastructure View I work across web applications, internal networks, servers and databases instead of limiting analysis to a single layer.
Incident Response Context I have also mitigated and eradicated security incidents, helping restore affected services and reduce operational impact.
Builder Knowledge My development background helps connect vulnerabilities with implementation details, server behavior and realistic fixes.

Engagement areas

  • Web application attack surface review
  • Internal network and local system assessment
  • Incident mitigation, eradication and service recovery support
  • Security analysis with clear written reporting
  • Database-aware investigation and remediation context
  • Developer-aware remediation and implementation review
  • Technical communication for follow-up actions

Operational history

01

HackerOne

Penetration Tester

  • Focused on offensive security testing and identifying meaningful weaknesses.
  • Documented findings with clear impact so they can be reviewed and prioritized.
  • Reinforced the reporting side of pentesting, not only discovery.
02

Zeroazul

Fullstack Developer ยท Cybersecurity Analysis

  • Performed cybersecurity analysis on web applications and internal networks, evaluating weaknesses across multiple environments.
  • Mitigated and eradicated security incidents, helped restore affected servers and supported service recovery.
  • Worked heavily with databases and application internals, adding practical context for investigation and remediation.

Training stack

My training combines offensive security, defensive analysis and software development foundations, supported by a detailed HTB Academy transcript.

Paths completed 11
Targets compromised 644
HTB ranking Top 1%

Completed HTB job role paths

Web Penetration Tester Completed path focused on web recon, exploitation, APIs and professional reporting.
Penetration Tester Completed path covering methodology, enterprise assessments, exploitation and reporting.
SOC Analyst Completed path covering monitoring, SIEM, traffic analysis, DFIR-related work and reporting.
Junior Cybersecurity Analyst Completed path bridging offensive and defensive foundations for practical cybersecurity work.

Hack The Box credentials

CJCAJunior Cybersecurity Analyst Associate
CDSADefensive Security Analyst
CPTSPenetration Tester Specialist

External cybersecurity studies

IBMCybersecurity Analyst Professional Certificate (V2)
GoogleCybersecurity Professional Certificate V2

Development foundations

CodeCademyFull-Stack Engineer
CodeCademyComputer Sciences

Transcript-backed modules

SQL Injection Fundamentals Cross-Site Scripting (XSS) Web Service & API Attacks Active Directory Enumeration & Attacks Linux Privilege Escalation Windows Privilege Escalation Documentation & Reporting Attacking Enterprise Networks Security Monitoring & SIEM Fundamentals Threat Hunting with Elastic Investigating with Splunk Working with IDS/IPS

Communication

  • English
  • Spanish

Development Stack

Python JavaScript Bash PowerShell SQL PHP

Offensive Arsenal

Burp Suite Nmap Metasploit BloodHound John the Ripper Hashcat Hydra Netcat Socat OWASP ZAP PowerView NetExec Impacket SQLMap

Systems Knowledge

Linux (Debian/RHEL) Windows Server Active Directory Docker AWS REST APIs MySQL/PostgreSQL Git

Operational highlights

Platform Expertise

Linux (Debian/Ubuntu/RHEL/Kali) Windows (7/8/10/11/Server)

Compliance & Standards

NIST Cybersecurity Framework HIPAA PCI DSS PTES

HackTheBox Lab Coverage

Compromised 644 targets across diverse attack surfaces in HackTheBox labs, demonstrating practical proficiency in:

Active Directory Attacks Kerberos exploitation, AS-REP roasting, Kerberoasting, DCSync, GPO abuse, and domain privilege escalation
Privilege Escalation Linux: SUID binaries, kernel exploits, sudo misconfigurations, cron jobs. Windows: SeImpersonate, unquoted service paths, registry manipulation
Web Application Exploitation SQL injection, XSS, CSRF, SSRF, file upload bypasses, authentication flaws, API vulnerabilities, deserialization attacks
Network & Service Exploitation SMB, RDP, SSH, FTP exploitation, port forwarding, pivoting, tunneling, and lateral movement techniques