Security Research

Penetration Testing

Security testing across web applications, APIs, Android, Active Directory, and networks — through lab environments, training delivery, and independent bug bounty research.

Honest framing: My penetration testing skills come from self-directed lab work, training delivery at security academies, basic web app testing at Metallearn alongside developers, and independent bug bounty research on Bugcrowd. I have not held a dedicated penetration tester role — but I have built genuine, hands-on skills through continuous practice and research.
Testing Domains
🌐
Web Application Testing
LAB + BUG BOUNTY + REAL TESTING
Tested authentication mechanisms, session handling, and input validation through lab environments and bug bounty programmes. At Metallearn, worked alongside developers to test internal web applications for common security flaws.
  • SQL injection and input validation flaws
  • Authentication bypass and session management issues
  • Broken Access Control and IDOR vulnerabilities
  • Cross-Site Scripting (XSS) — stored, reflected, DOM-based
  • Server-Side Misconfiguration (found in real bug bounty research)
Burp SuiteSQLMapOWASP Top 10Bugcrowd
🔗
API Security Testing
LAB + BASIC REAL TESTING
Analysed API authentication and authorisation mechanisms — tested endpoints for improper access control, reviewed request/response behaviour for security issues, and examined token handling.
  • API authentication and token validation testing
  • Improper access control and authorisation flaws
  • Request/response analysis for information disclosure
  • Rate limiting and input validation in API endpoints
Burp SuitePostmanOWASP API Top 10
📱
Android Application Testing
LAB ENVIRONMENT
Analysed Android applications for insecure data storage, tested API communication used by mobile apps, and investigated application behaviour in controlled lab environments.
  • Insecure local data storage analysis
  • API communication testing from mobile clients
  • Traffic interception via Burp Suite proxy
  • Application behaviour analysis for security flaws
MobSFBurp SuiteAndroid Studio
🏢
Active Directory Security
LAB ENVIRONMENT
Built and tested Active Directory lab environments to study common attack techniques — Kerberoasting, Pass-the-Hash, enumeration, and lateral movement concepts aligned with MITRE ATT&CK.
  • AD enumeration using BloodHound and ldapdomaindump
  • Kerberoasting and AS-REP Roasting concepts
  • Pass-the-Hash and credential abuse techniques
  • Domain privilege escalation path analysis
BloodHoundImpacketCrackMapExecMimikatz
🕸
Network Security Testing
LAB ENVIRONMENT
Network reconnaissance, service enumeration, and attack surface analysis using Nmap and Wireshark. Studied common network-based attack techniques in isolated lab environments.
  • Network scanning and host discovery with Nmap
  • Service and version enumeration
  • Traffic capture and protocol analysis with Wireshark
  • Network attack surface identification
NmapWiresharkMetasploit
🐛
Bug Bounty — Bugcrowd
INDEPENDENT RESEARCH
Active independent researcher on Bugcrowd. Identified a server-side misconfiguration vulnerability in a production application through self-directed testing and practised responsible disclosure.
  • Broken Access Control and IDOR research
  • Server-Side Misconfiguration — real finding, responsible disclosure
  • XSS and authentication flaw hunting
  • OWASP Top 10 methodology-driven testing
BugcrowdResponsible DisclosureOWASP
Tools & Methodology
Burp Suite
Nmap
Wireshark
SQLMap
Metasploit
BloodHound
Impacket
ffuf
Gobuster
Nikto
MobSF
Kali Linux
OWASP Top 10 Coverage
A01Broken Access Control
A02Cryptographic Failures
A03Injection (SQLi, XSS)
A04Insecure Design
A05Security Misconfiguration
A07Auth & Session Failures
A08Software & Data Integrity
A10SSRF