I am a self-motivated technology enthusiast and cybersecurity learner with hands-on experience in Linux systems, ethical hacking tools, and basic network security practices. Despite being at an early stage in my career, I have actively explored multiple areas of cybersecurity and system administration through practical experimentation and independent learning.
My primary working environment is Kali Linux, where I regularly install, configure, and troubleshoot various tools and system components. I have experience working with Linux commands, managing packages using APT, configuring services, and resolving system-level issues such as network connectivity, DNS problems, and hardware detection.
In cybersecurity practice, I have used well-known penetration testing tools such as Metasploit and Bettercap to understand vulnerabilities, network attacks, and exploitation techniques in controlled environments. Through these tools, I have learned how penetration testing frameworks work, how exploits are executed, and how attackers analyze and interact with network services.
I also have practical exposure to web server configuration and debugging, including working with Apache HTTP Server and PHP environments. I have analyzed server logs, restarted services, and diagnosed runtime errors to understand how web applications operate and how backend issues can be identified and resolved.
Additionally, I am comfortable performing system optimization and performance tuning tasks. For example, I have configured memory optimization techniques such as ZRAM to improve system performance on limited hardware. I also work with disk partitions and storage setups, including SSD and HDD configurations, to create efficient Linux installations.
My technical exploration also includes network analysis and wireless security testing, where I analyze Wi-Fi networks, signal strength, encryption types, and client connections using Linux-based networking tools. This has helped me develop an understanding of how wireless networks operate and how vulnerabilities can be detected.