Compromised 644 targets across diverse attack surfaces in HackTheBox labs, demonstrating practical proficiency in:
Active Directory Attacks
Kerberos exploitation, AS-REP roasting, Kerberoasting, DCSync, GPO abuse, and domain privilege escalation
Privilege Escalation
Linux: SUID binaries, kernel exploits, sudo misconfigurations, cron jobs. Windows: SeImpersonate, unquoted service paths, registry manipulation
Web Application Exploitation
SQL injection, XSS, CSRF, SSRF, file upload bypasses, authentication flaws, API vulnerabilities, deserialization attacks
Network & Service Exploitation
SMB, RDP, SSH, FTP exploitation, port forwarding, pivoting, tunneling, and lateral movement techniques