About Me

-rw-r--r--

Modified: 2024-06-01

root@wingertries:~$ whoami

🔍 What I'm Into

Focus Areas: AD & Azure Security
Specialization: Social Engineering
Learning: Red Teaming & EDR Bypass

🏆 CTF Rankings

Global Rank: Top 100
Platforms: HackTheBox, TryHackMe
Categories: Web, Pwn, Crypto, Forensics
TryHackMe Rank: Hacker
THM Points: 12,500
THM Position: #1,500

🛠️ Arsenal

• Burp Suite
• Nmap
• Metasploit
• BloodHound
• ProxMox (Lab)
• Custom Scripts
root@wingertries:~$ nmap -sV -sC localhost
Starting Nmap 7.94...
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1
80/tcp open http nginx 1.18.0
443/tcp open https nginx 1.18.0
root@wingertries:~$ _
root@blog:~$ cat about.md

About Me

Hello, I'm Winger - a cybersecurity enthusiast and penetration tester based in Sydney, Australia. I love diving deep into systems, learning new security techniques, and building tools that help me understand how things work (all legally, of course! 🔓).

When I'm not breaking into systems (with permission), you'll find me setting up my home lab with ProxMox, attending local security meetups like SecTalks and BSides, or watching sports (Soccer, NBA, NFL - you name it!).

Official Credentials

What I Do

I spend most of my time exploring the world of cybersecurity through various lenses. My main focus areas include social engineering, Active Directory penetration testing, and Azure AD security. I love working with tools like Metasploit, BloodHound, and Nmap to understand how systems can be compromised and how to defend against such attacks.

When I'm not doing hands-on testing, I'm usually writing Python scripts to automate tasks, managing my home lab with ProxMox, or diving into new security tools and techniques. I believe in continuous learning, which is why I'm always working towards new certifications and attending security conferences.

Tools & Technologies

My toolkit includes a mix of industry-standard and open-source tools. I work extensively with Metasploit Framework for exploitation, BloodHound for Active Directory mapping, and various custom scripts I've developed for specific tasks. I'm comfortable with Python for automation, Bash for system administration, and PowerShell for Windows environments.

I also maintain a home lab environment where I can safely practice new techniques, test tools, and simulate real-world attack scenarios without any legal concerns.

Current Projects

I'm currently working on several interesting projects. My main focus is on expanding my red teaming toolkit and improving my home lab setup. I'm also contributing to open-source security tools and working on some personal automation scripts.

My home lab is my pride and joy - it's where I can safely experiment with new techniques, test tools, and simulate complex attack scenarios. I use ProxMox for virtualization and have various Windows and Linux environments set up for different testing scenarios.

Hobbies & Interests

When I'm not immersed in cybersecurity, you'll find me at local security meetups like SecTalks, BSides, and CrikeyCon. These events are great for networking, learning new techniques, and staying connected with the security community.

I'm also a big sports fan - I follow Soccer, NBA, and NFL religiously. Gaming is another passion of mine, especially FIFA. These activities help me maintain a good work-life balance and keep my mind sharp for the technical challenges I face in cybersecurity.

Contact

Feel free to reach out if you want to chat about cybersecurity, collaborate on projects, or just say hello! I'm always interested in connecting with fellow security enthusiasts.

$ echo "Let's build something awesome together!"
Let's build something awesome together!

$ contact --info
Email: i@0xbj.xyz
Location: Sydney NSW, Australia
LinkedIn: linkedin.com/in/bijayy-upreti
GitHub: github.com/wingerbijay