Welcome to my digital space

👋 Hello! I’m Suhesh Kasti

Your friendly neighbourhood Hackerman

WELCOME TO MY CORNER OF THE INTERNET, FELLOW HUMAN! 👽

I’m here to share my journey in Cybersecurity through blogs, checklists, and cheat sheets. Need a checklist or cheat sheet to hack the matrix (legally, of course 😉)? Get them here at the affordable price of just $FREE.99

  • You can start by exploring blogs I have written and start learning with me
  • Ready to get your hands dirty?? Use the checklists to be a billion times more efficient
  • Took a break or got memory like mine? Forgot what and how to do…Worry not use the cheatsheets
Profile image
Cybersecurity

My Cybersecurity Journey

feature image

You see, I’m almost Batman… but instead of Gotham, I kinda try to save web applications (Batman couldn’t either) 🤡.
Cybersecurity has been my passion, and here’s a quick look at what I’ve been doing with it:

DevOps

My Expertise

feature image

I can make metasploit go brrrrrr….

Web Application Security (OWASP Top 10)
WAF / Bot / DDoS Protection (F5, BIG-IP, WAF)
Vulnerability Assessment & Basic Pentesting
Linux, Networking, HTTP/S fundamentals
Security Monitoring & Incident Analysis
Projects

Current Focus

feature image

At the moment, I’m juggling quite a bit (cybersecurity life, amirite?). Here’s what’s on my plate right now:

Grinding away for the Certified Penetration Testing Specialist (CPTS), because who doesn’t like exams… right? RIGHT??? 🫠

My Skills & Expertise

Specialized knowledge and capabilities in various cybersecurity domains

Cybersecurity

Penetration Testing

Systematic testing of systems, networks and applications to identify security vulnerabilities that could be exploited by attackers.

Related Topics:
  • Web Application Testing
  • Network Penetration
  • Mobile App Testing
  • API Security Testing
Linux Privilege Escalation

Linux Privilege Escalation

Techniques and methodologies to identify and exploit vulnerabilities that allow attackers to gain elevated access on Linux systems.

Related Topics:
  • SUID/SGID Exploits
  • Sudo Misconfigurations
  • Kernel Exploits
  • Cron Job Abuse

Active Directory

Security assessment and exploitation of Microsoft’s directory service for Windows domain networks.

Related Topics:
  • Domain Privilege Escalation
  • Kerberos Attacks
  • LDAP Enumeration
  • Pass-the-Hash/Pass-the-Ticket

Cloud Security

Protection of cloud-based infrastructure, applications and data from threats, breaches and vulnerabilities.

Related Topics:
  • AWS Security
  • Azure Security
  • Container Security
  • Serverless Security

Malware Analysis

Studying malicious software’s components, behavior and purpose to understand how to detect and defend against it.

Related Topics:
  • Static Analysis
  • Dynamic Analysis
  • Reverse Engineering
  • Memory Forensics

Digital Forensics

Collection, preservation and analysis of digital evidence to investigate incidents and security breaches.

Related Topics:
  • Disk Forensics
  • Memory Analysis
  • Network Forensics
  • Mobile Device Forensics

Programming & Development

Python

Python

Versatile programming language used for scripting, automation, and developing security tools.

Related Topics:
  • Security Automation
  • Tool Development
  • Data Analysis
  • Web Scraping

Bash Scripting

Command-line scripting for automating system administration tasks and security operations.

Related Topics:
  • System Automation
  • Security Scripts
  • Log Analysis
  • Reconnaissance Tools

Web Development

Creating web applications with a focus on security best practices and secure coding principles.

Related Topics:
  • Secure Coding
  • OWASP Top 10
  • Frontend Security
  • Backend Security

Tools & Technologies

Burp Suite

Burp Suite

Comprehensive web vulnerability scanner and proxy tool for security testing of web applications.

Related Topics:
  • Proxy Interception
  • Vulnerability Scanning
  • Intruder Attacks
  • Extension Development
Wireshark

Wireshark

Network protocol analyzer used to examine network traffic and troubleshoot security issues.

Related Topics:
  • Traffic Analysis
  • Packet Inspection
  • Network Forensics
  • Protocol Analysis

Metasploit

Framework for developing, testing, and executing exploits against remote targets.

Related Topics:
  • Exploit Development
  • Post-Exploitation
  • Payload Generation
  • Auxiliary Modules