Penetration tester , vulnerability assessment ,Network Security, System Admin
IDACO, Charismamart, Original Marines
Total years of experience :24 years, 4 Months
*IDACO (Industrial Development of auto parts), Charismamart super market and Original Marines clothes shops (same owner).
Maintained and troubleshooted all network problems, servers auditing, active directory, Dhcp, Dns, Isa 2004 and Exchange 2003. Managed group policy. Configured IP cam in Charismamart. Built voip and frost trust between IDACO Company and Charismamart via Wan, also built VPN back to back scenario between them to sync all data.
Migrate windows server 2003 with windows server 2012.
Migrate Microsoft Exchange 2003 with Microsoft Exchange 2013.
Pentration testing For all Application and Operating system.
vulnerability assessment .
network security .
malware removal .
internet security .
Secured e-commerce cart and website against attackers and hackers.
Better to talk about my security because it is a lot and i do not want to make my CV so long.
- Proven success in delivering risk assessment and risk mitigation services to clients.
- Ability to perform penetration testing and network security assessments.
- Advanced communication skills with experience in presenting and writing technical reports for a technical and non-technical audience.
- Experience working as leader or part of a “Red Team” who attempts to gain access to live systems using known exploits while following well defined “white hat” hacking rules of engagement.
- Experience in IT with advanced expertise with penetration tools such as Kali Linux, Metasploit, Empire, Burpsuite, nessus …etc .
- Expertise with command line scripting languages on multiple operating systems such as Python, BASH, or PowerShell.
- Expertise with injection techniques such as SQL, NOSQL, LDAP, LFI, RFI, or raw sockets.
- 10 or more years of relevant penetration testing, network administration, information security or technical IT and it experience consulting experience.
- Knowledge of network protocols such as HTTP(S), SQL, MySQL, FTP, SSH, TFTP, SSL, or LDAP…..etc.
- Knowledge of scanning techniques such as nmap, netstat, zenmap, or nc.
- Knowledge of penetration rules of engagement, researching and modifying public exploits into usable examples
- Knowledge of service end point and application fuzzing
- Familiarity with application security tools, techniques, and methodologies to complement work.
Discover 0day bug :
My exploit-DB link :
https://www.exploit-db.com/author/?a=8303
Discover it by Manual Fuzzing
৹Penetration tester and vulnerability assessment (Secured e-commerce cart and website against attackers and hackers. Tested and fixed these web-sites):
uk.msn.com
57357 Cancer Hospital web-site (http://www.57357.com)
And much more.
Courses:
- MCSE Security 2003 with security
- MCDBA and Certified Ethical Hacker ( C|EH )
Medcom (Education Center), Cairo, . Egypt.
Gave courses MCSE Security 2003 and MCDBA and Certified Ethical Hacker ( C|EH )
Managed network infrastructure components. Configured and administrated the LAN and WAN equipment. Administrated user accounts, printers, backups. Ensured network security by following up user permissions and appling auditing and did pentration testing to all network and server.
Secured e-commerce cart and website against attackers and hackers.