Trainee [Network and Web Penetration Tester] | Role: Found vulnerabilities in the client’s website as a network and web pentester, exploited them and submitted reports for mitigating those vulnerabilities. Completed TryHackMe challenge boxes and submitted the respective write-ups. Completed Protswigger labs and write the respective reports. Capstone Lab Coffee Website Pentesting Role: Conducted comprehensive assessment of client's main website vulnerabilities. Accessed user and admin credentials from the database and logged in as admin. Modified product ratings, uploaded a sanitized malicious file for testing purposes. Utilized tools like Nmap, BrupSuite, dirbuster, sqlmap, hashcat, and hash-identifier. RootMe: A CTF for beginners, TryHackMe Box Role: Found both the flags, user.txt and root.txt, that were supposed to found in order to complete the box. Nmap, BrupSuite and gobuster we the tools that were used in this project. Being the web pentester, I did all the exploitation and report writings and upload them. Academy001 Vulnerable Machine Access Role: Got the reverse shell access of the main website through a php code that was uploaded in the upload photo section. Nmap, BrupSuite and gobuster, hash-identifier, and hashcat were the tools that were used in this project. Being the web pentester, I did all the exploitation and report writings and upload them.