π΄ Aspiring Red Team / Offensive Security Professional with a strong foundation in attack simulation, brute-force techniques, and understanding of defensive detection mechanisms.
I focus on how attacks work, how they are detected, and how attackers adapt.
- Red Teaming / Penetration Testing
- Offensive Security & Attack Simulation
- Understanding Blue Team detection to improve evasion strategies
- Continuous hands-on lab practice
- SSH Brute-force & Credential Attacks
- Password Spraying Concepts
- Attack Pattern Analysis
- Understanding Detection Thresholds
- Red Team Reporting Mindset
- Operating Systems: Kali Linux, Linux Internals
- Offensive Tools: Hydra, Nmap, Metasploit (learning)
- Analysis & Visualization: Power BI, DAX, Power Query
- Version Control: Git, GitHub
- Protocols: SSH, TCP/IP (fundamentals)
- Simulated SSH brute-force attacks using Kali Linux (Hydra)
- Studied how failed authentication attempts are detected and classified
- Built a Power BI dashboard to visualize attacker behavior and alert thresholds
- Approached the project from a Red Team vs Blue Team perspective
π Project Repository:
https://github.com/shreyasaxena725-oss/Security-Incident-Trend-Analysis
I believe strong Red Teamers must:
- Understand how defenders think
- Analyze detection logic
- Learn to adapt attacks to avoid noisy behavior
- Document findings clearly and professionally
- Advanced Nmap enumeration
- Privilege escalation (Linux)
- Web application vulnerabilities
- Internal network attack techniques