---4MR0---

Cybersecurity Enthusiast | Penetration Tester | CTF Player

Technical Skills

A categorized breakdown of my competencies in various cybersecurity domains.

Hardware

  • IoT Device Analysis
  • UART, SPI, I2C Bus Communication
  • JTAG Debugging
  • Firmware Extraction & Reverse Engineering (Binwalk, Firmware-Mod-Kit)
  • Tools: Bus Pirate, Saleae Logic Analyzer, JTAGulator

Forensics

  • Disk Forensics
  • Network Packet Analysis (PCAP)
  • Malware Analysis (Static & Dynamic)
  • Steganography Detection & Extraction
  • Tools: Autopsy, Volatility, Wireshark, Ghidra

Web Security

  • OWASP Top 10 (e.g., XSS, SQLi, CSRF, SSRF)
  • Client-side Attacks (DOM-based XSS)
  • Server-Side Template Injection (SSTI)
  • Tools: Burp Suite, Nmap, Nuclei, wappalyzer

Networking

  • TCP/IP Stack Deep Dive
  • Network Reconnaissance & Enumeration
  • Firewalls
  • VPN & Tunneling Protocols
  • Active Directory
  • Tools: Nmap, Wireshark, tcpdump, Netcat

CTF Writeups

Detailed walkthroughs of challenges I've solved. This is where I apply my skills and learn new techniques.

LakeCTF 2025 - packet analysis

network analysis 100 Points

At this challenge i found my self in front of packets not just normal and the known packets this time with packets captured during a phone messaging through 5G SMS, and the description says What are these SMS I received as soon as I connected to the gNB?. to answer this question you need to understand the protocols gNB--the base station-- uses to connect UE(user equipement/client) with the 5G core network. and here is a walkthrough this.

SQLi WAF Bypass Burp Suite

Read Full Writeup

HTB Cyber Apocalypse 2022 - Gatekeeper

May 2022 Forensics Easy

A PCAP file was provided containing network traffic from a suspicious device. By analyzing the traffic with Wireshark and `tshark`, I discovered a series of ICMP packets with data hidden in the payload (a covert channel). Extracting and reassembling this data revealed a zip file password, which unlocked the flag.

PCAP Analysis Wireshark Covert Channel tshark

Read Full Writeup

DEF CON CTF Quals 2021 - realworld-sigpwn

May 2021 Hardware / IoT Medium

This challenge provided a firmware image for an IoT device. Using Binwalk, I extracted the file system and found a custom binary. By reverse engineering the binary with Ghidra, I identified a hardcoded backdoor password in the firmware's telnet service, which allowed me to log in and read the flag file.

Firmware Analysis Reverse Engineering Ghidra Binwalk

Read Full Writeup

Learning Resources

A curated list of websites, tools, and communities I use to stay sharp and learn new things. I highly recommend them!

Hardware & IoT

  • Hackaday - Projects and news for hardware hackers.
  • r/iotsecurity - Community discussions on IoT threats.
  • Jefferson - JTAG tool for exploring devices.
  • OpenWrt Doc - GNU/linux distribution for embedded devices.DOC

Forensics

Web Security

Networking