WANNACRY ANALYSIS
Static + dynamic analysis of WannaCry ransomware. Documented EternalBlue propagation chain, AES-RSA encryption routine, and C2 comms in a sandboxed environment.
Breaking systems ethically so they can't be broken maliciously — full-lifecycle offensive security from recon to remediation report.
Static + dynamic analysis of WannaCry ransomware. Documented EternalBlue propagation chain, AES-RSA encryption routine, and C2 comms in a sandboxed environment.
Home lab with live traffic capture. Custom Snort IDS rules detecting port scans, brute-force attempts, and anomalous payloads with full alert correlation.
CIS-benchmark Linux server audit. Identified and remediated SSH misconfigs, kernel parameters, and service exposure with before/after compliance scoring.
Web exploitation, network attacks, post-exploitation, and red team operations.
Passive and active reconnaissance, subdomain enumeration, and attack surface mapping.
Framework proficiency, scripting, and custom tooling development.
Blue team perspective, log analysis, and detection engineering.
Guided learning paths — web exploitation, AD, privilege escalation.
PROFILE →Real-world lab machines simulating enterprise environments.
PROFILE →Responsible disclosure on live programmes with real impact.
PROFILE →Forensics, crypto, web, pwn, and reverse engineering challenges.
CTFTIME →Open to penetration testing contracts, SOC analyst roles, and bug bounty collaboration. Let's work together.
contact@erprakashmijar.com