Hey there, I am Monty

Computer Hacker, CTF Player, Penetration Tester, Security Enthusiast, Web Developer, InfoSec Nerd

Name: Monty Shyama

Profile: Security Analyst

Email: montyshyama@pm.me

My Arsenals

OWASP 95%
BURP SUITE 90%
LINUX 85%
ROUTING & SWITCHING 80%
NMAP 85%
METASPLOIT 85%
WIRESHARK 70%
PYTHON 85%
LARAVEL 80%
BOOTSTRAP 75%
HTML 90%
MYSQL 75%
BUFFER OVERFLOW 70%
RECONNAISSANCE 70%
About me

I’m an aspiring Security Engineer currently located in beautiful Himachal Pradesh, India. I’ve been studying Computer Science at the Indian Institute of Information Technology Una (NIT Campus, Hamirpur) since 2016. I’ll be graduating with a Bachelor of Technology in May 2020 with 10 months of work experience in the Cybersecurity industry.

I’ve had an interest in working with computers since learning to write codes with Java in the 9th grade. Watching hacker-themed movies also sparked my interest in Cybersecurity.

Previously, I’ve interned at Cybervie as a Security Analyst Intern. I have experience in a variety of areas, including Web Application Penetration Testing, Networking Protocols & Web Development. I’m interested in building strong and secure system architectures, & enjoy learning about low-level programming (Assembly x86-64), operating systems & Information security.

One of the most rewarding experiences of college was co-founding InfoSec Community in 2018, where I organized 24-hours long CTF competition, focusing on making the tech community more inclusive, accessible & diverse.

I’m passionate about tech education; I believe that to build a better approach in Penetration Testing, it is important for me to understand & learn things from the Developer's side also.

I’m always looking for opportunities to further develop my skills, and positively impact those around me with meaningful work. You can find me online on Twitter, LinkedIn, or through email. When I’m not trying to hack, I’m probably reading infosec tweets, listening to music, brunching or sleeping.

Skills

These are some of the things which I have learned (so far).

Penetration Testing

TCP/IP

Information Security

OWASP TOP 10

Operating System

Web Applications

54

COURSE CURRICULUM COMPLETED

8

MONTHS OF INDUSTRY EXPERIENCE

5

TOTAL PROJECTS

11

HTB MACHINES HACKED

Projects

Some of the cool stuffs which I have coded surprisingly.

Blogs

Hacking in Darkness

ROP Attacks, Mitigation Strategies and its Benign Uses

Return-oriented programming (ROP) is one of the most common attack methodologies to exploit software specific vulnerabilities in the modern-day operating systems.

Typhoon 1.02

Step-by-step walk-through of Typhoon 1.02: A Vulnhub VM

This penetration test report contains step-by-step procedure for gaining user and root shell from a vulnerable ubuntu machine running various services. The purpose of this report is to ensure that the student has a full understanding of penetration testing methodologies as well as the technical knowledge to implement the same.