Computer Hacker, CTF Player, Penetration Tester, Security Enthusiast, Web Developer, InfoSec Nerd
Name: Monty Shyama
Profile: Security Analyst
My ArsenalsOWASP 95%
I’m an aspiring Security Engineer currently located in beautiful Himachal Pradesh, India. I’ve been studying Computer Science at the Indian Institute of Information Technology Una (NIT Campus, Hamirpur) since 2016. I’ll be graduating with a Bachelor of Technology in May 2020 with 10 months of work experience in the Cybersecurity industry.
I’ve had an interest in working with computers since learning to write codes with Java in the 9th grade. Watching hacker-themed movies also sparked my interest in Cybersecurity.
Previously, I’ve interned at Cybervie as a Security Analyst Intern. I have experience in a variety of areas, including Web Application Penetration Testing, Networking Protocols & Web Development. I’m interested in building strong and secure system architectures, & enjoy learning about low-level programming (Assembly x86-64), operating systems & Information security.
One of the most rewarding experiences of college was co-founding InfoSec Community in 2018, where I organized 24-hours long CTF competition, focusing on making the tech community more inclusive, accessible & diverse.
I’m passionate about tech education; I believe that to build a better approach in Penetration Testing, it is important for me to understand & learn things from the Developer's side also.
I’m always looking for opportunities to further develop my skills, and positively impact those around me with meaningful work. You can find me online on Twitter, LinkedIn, or through email. When I’m not trying to hack, I’m probably reading infosec tweets, listening to music, brunching or sleeping.
These are some of the things which I have learned (so far).
54COURSE CURRICULUM COMPLETED
8MONTHS OF INDUSTRY EXPERIENCE
11HTB MACHINES HACKED
Some of the cool stuffs which I have coded surprisingly.
Conducted Security Testing for Internet & Intranet Web Applications
Conducted Detective Threat Mitigation using known attack vectors
Performed SAST & DAST on projects under development
Vetted the tool-based outcomes and removed false positives
Generated multiple reports based on VAPT results
Return-oriented programming (ROP) is one of the most common attack methodologies to exploit software specific vulnerabilities in the modern-day operating systems.
This penetration test report contains step-by-step procedure for gaining user and root shell from a vulnerable ubuntu machine running various services. The purpose of this report is to ensure that the student has a full understanding of penetration testing methodologies as well as the technical knowledge to implement the same.