WANNACRY
ANALYSIS
Static and dynamic analysis of WannaCry ransomware. Documented EternalBlue propagation, SMBv1 exploitation chain, AES-RSA encryption routine, and C2 communication in a sandboxed lab.
VIEW REPORT →Penetration testing · Web exploitation · Network attacks · Red team operations — built to break systems before the bad guys do.
Static and dynamic analysis of WannaCry ransomware. Documented EternalBlue propagation, SMBv1 exploitation chain, AES-RSA encryption routine, and C2 communication in a sandboxed lab.
VIEW REPORT →Home lab capturing live network traffic. Custom Snort IDS rules to detect port scans, brute-force, and anomalous payloads. Full traffic analysis and alert correlation pipeline.
VIEW WRITEUP →CIS-benchmark Linux server audit via Lynis. Remediated SSH misconfigs, filesystem permissions, kernel parameters, and service exposure. Full before/after compliance scoring.
VIEW AUDIT →Guided learning paths — web exploitation, Active Directory, privilege escalation, and network security.
PROFILE →Real-world lab machines and Prolabs simulating enterprise environments and AD attack chains.
PROFILE →Responsible disclosure on live programmes. Legal, real-target practice with verifiable impact.
PROFILE →Timed competitions across forensics, crypto, web, pwn, and reverse engineering challenges.
CTFTIME →Reading what defenders see — Windows Event Logs, Syslog, and SIEM alerts (Splunk, Elastic) to improve stealth and surface detection gaps in reports.
How endpoint detection tools flag behaviour — studied to craft realistic payloads and provide actionable EDR tuning recommendations post-engagement.
Tracking NVD, vendor advisories, and PoC releases to identify newly disclosed CVEs before patches are widely applied. N-day exploitation assessment.
Mapping attack techniques to ATT&CK framework TTPs — enabling detection rule recommendations and red-to-blue knowledge transfer in final reports.
An offensive cybersecurity professional with hands-on experience across the full attack lifecycle — recon through reporting. I break things ethically so they can't be broken maliciously.
Passionate about web exploitation, network attacks, and building automation tooling. Continuously practising on real environments through CTFs, bug bounty, and home labs.
Available for penetration testing engagements, bug bounty collaboration, and security consulting.
contact@erprakashmijar.com