Passionate about ethical hacking, network security, and vulnerability assessment.
$ cat about.txt
Hi, I'm Tony — a dedicated and curious cybersecurity enthusiast currently building a strong foundation in offensive and defensive security practices. I am passionate about understanding how systems can be compromised and how to defend them effectively.
My journey into cybersecurity started with a fascination for how networks communicate and how vulnerabilities can be discovered and patched. I actively practice in lab environments using tools like Kali Linux, Metasploit, and Wireshark to sharpen my skills in penetration testing and network analysis.
I am actively seeking an internship or attachment opportunity where I can apply my skills, contribute to real-world security challenges, and grow alongside experienced professionals in the field.
$ _
Conducted a comprehensive network vulnerability assessment on a controlled lab environment. Identified open ports, running services, and potential attack vectors using Nmap's scripting engine (NSE).
Captured and analyzed live network packets to identify suspicious traffic patterns, unencrypted credentials, and protocol anomalies. Documented findings in a structured security report.
Performed a full penetration test against the Metasploitable 2 vulnerable machine. Exploited multiple vulnerabilities including FTP, SSH, and web application flaws using Metasploit modules and manual techniques.
Designed and implemented firewall rules using iptables on a Linux system to filter inbound and outbound traffic. Tested rule effectiveness against simulated attack scenarios and documented the security policy.
Google / Coursera
Foundations of cybersecurity, network security, Linux, SQL, and security tools.
TryHackMe
Hands-on labs covering networking, web fundamentals, and Linux basics for security.
TryHackMe
Penetration testing methodology, exploitation techniques, and post-exploitation.
Cisco NetAcad
TCP/IP fundamentals, subnetting, routing protocols, and network troubleshooting.
EC-Council / Coursera
Introduction to ethical hacking, footprinting, scanning, enumeration, and exploitation.
Open to internship opportunities, collaborations, and cybersecurity discussions.