CTF & Training
CTF Competitions & Continuous Security Practice
Engaged in competitive cybersecurity challenges to develop hands-on offensive security skills across multiple domains while maintaining continuous learning through HackTheBox and TryHackMe platforms.
Objective
Develop practical offensive security skills through competitive challenges and structured learning platforms, focusing on real-world exploitation techniques.
Tools & Technologies
Burp Suite
Python
Ghidra
radare2
HackTheBox
TryHackMe
Various CTF Tools
Methodology
1
CTF participation
2
Challenge analysis
3
Tool selection and exploit development
4
Automation scripting
5
Continuous practice on training platforms
Key Outcomes & Impact
- Participated in BSidesPGH 2025 and THRISS 2025 CTF competitions
- Solved approximately 12 challenges across multiple categories
- Web Exploitation: SQL Injection (SQLi), Cross-Site Scripting (XSS), CSRF, Server-Side Request Forgery (SSRF)
- Cryptography: RSA and AES cryptographic challenges
- Reverse Engineering: Binary analysis using Ghidra and radare2
- Forensics: Digital evidence analysis and investigation
- Developed Python automation scripts to accelerate challenge solving and exploit development
- Maintain active HackTheBox and TryHackMe accounts for ongoing offensive security practice
Lessons Learned
CTF competitions accelerate learning by providing focused, time-pressured problem-solving scenarios. Automation significantly enhances efficiency in repetitive exploitation tasks. Continuous practice through training platforms maintains and expands offensive security capabilities.
Skills Demonstrated
Web Application Testing
Python Development
Security Automation
Penetration Testing & Offensive Security