Cybersecurity and Hacking

You Sweet Software...

Hi There, In the computer world since 1999 and I like technology and the security aspect that come with it. Microsoft Windows or GNU/Linux, it doesn't matter, I like them both. I'm not so fund of Apple stuff however. I mainly use GNU/Linux, especially for that sort of experimentations and for my various researches. Recently passed my IBM Cybersecurity Analyst certification even if I'm into this already a long time. But we never know, if Covid come back, I have paper for in my toilet! Nah, that's mean, it still has learned me tons of things.

This page is here to list a few hacking techniques and services I provide. Essentially meant to show of for recruiters. So I will try to keep the technical terminologies as simple as possible.

I have obtained my Professional IBM Cybersecurity Analyst Certification and working on other certifications. Part of the Cybersecurity Analyst job, is the awareness. Warn, inform and educated people. I'm very annoying for this but I think it is very important these days to show how easy it can be to trick people, get access to insecure computers or networks, especially with all these user errors. Part of my work, I'm also giving the best practice and best security recommendations.

I'm also managing the:

A few keywords about what I like to do

I like very much the Offensive Security, the Penetration testing. However, I also love the Defensive Security. Knowing how to break in, permit you to know how to defend you and vice versa. See also bellow my TryHackMe Writeups, that can maybe give a better idea.

  • Penetration Testing (Hacking) - Network, Computers and Web APPs - This is real dope!
  • Securing / Hardening - After breaking it (looking into it), making it more secure ;-)
  • Social Engineering - This is fun!
  • WI-FI Cracking - WEP, WPA, WPA2 cracking. WPS or whatever cracking.
  • Fake WI-FI Access Points - Honeypots so I have full sniff capabilities :-)
  • MITM (Man In The Middle) Attacks
  • ARP Poisoning - This is a key in MITM attacks.
  • DNS Spoofing - To redirect to a malicious website.
  • Forcing https downgrading to http and hsts bypassing - So that we can sniff the network traffic, as all secured https traffic is secure and we can't read the data into this.
  • All Kind of Website Injections - Such as JavaScript Injection, SQL Injection.
  • Enumerating of Server Services - Like: HTTP, SMB (Samba), NFS, SMTP, FTP, MySQL, Telnet...
  • Phishing, Malware injections, Backdoor - This is very trendy and a real nightmare for people :-D
  • Online and Offline Password Cracking - I tent to forget my passwords a lot.

TryHackMe Writeups

TryHackMe is a very nice and interesting website, playground and community where you can learn more about (Cyber)Security in some computers in a secure Lab environment. This to learn hacking and hardening computers. It is comparable to Hack The Box, but then you have more for your money ;-) Also, the TryHackMe is more open on the learning path, in the sense that you have more educational resources, as their goal really focus on learning, progressing and sharing of knowledge. Also, a lot of people create writeups of the rooms. This allow you to take a look on how others handled their challenges or if you are stuck at some point.

TryHackMe use hacktivities, a "room" to handle each topic and where you have different challenges of the style of CTF (Capture The Flag). This is so addictive! In other words, these are games for computer freaks.

As I am an active user, I also make quite a few writeups which I store on my dedicated TryHackMe repository on my GitHub account.

Feel free to contact me for my services