bash — abhishek@redteam

            
          

Engagements

Selected real-world assessments and operations.

client
🤖

LLM Security Assessment — Chat Assistant

Red team style assessment · LLM / AI security

Evaluated a LLM assistant for prompt injection, jailbreaks, data exfiltration and tool abuse. Executed practical attack chains end-to-end.

  • Bypassed guardrails to access internal-only information.
  • Delivered actionable fixes across model config, architecture and monitoring.
LLM security prompt injection red team
client
🕸️

Web Security Assessment — SaaS

Web pentest

End-to-end VAPT on a multi-tenant SaaS. Focused on authentication, authorization and business-logic abuse — not just scanner noise.

  • Chained path traversal + weak authentication into Privilege Escalation
  • Chained path traversal + misconfiguration into S3 bucket access.(With Read and Write Permission)
  • Delivered dev-friendly report with PoCs.
web vapt chaining vulnerability S3 Bucket Takeover Privilege Escalation

Labs & Experiments

Where I break my own stuff first — all offensive-focused.

AD / Network

Active Directory Red Team Lab

Full domain environment built to practise end-to-end kill chains — initial access, internal recon, lateral movement, privilege escalation and domain compromise.

  • Phishing → foothold → Kerberoasting → DA takeover.
  • Living Off the Land
  • Initial Foothold
active directory lateral movement kerberoasting
Web App

OWASP Juice Shop Lab

Intentionally vulnerable web app target for systematic web pentesting practice — from recon to authenticated exploitation, methodically covering the OWASP Top 10.

  • Covered XSS, SQLi, broken auth, IDOR and insecure deserialization.
  • Outputs structured VAPT-style reports for each attack category.
owasp top 10 burp suite web exploitation
API

End-to-End Phishing Simulation Lab

A complete phishing engagement built from scratch — OSINT to credential capture to report. Covers the full attacker workflow across infrastructure, tooling, evasion and social engineering.

  • Full phishing kill chain — OSINT recon, automated GoPhish deployment, cloned landing pages and live campaign execution.
  • Evilginx setup with custom phishlet to bypass MFA via session cookie theft.
  • Defense evasion and social engineering — infrastructure trust techniques, email evasion and pretext call + phishing.
gophish evilginx mfa bypass social engineering
AI / LLM

Cloud Pentesting - AWS

End-to-end AWS penetration testing lab covering enumeration, exploitation and privilege escalation across core cloud services using real-world attack tooling.

  • Enumerated IAM, S3, Lambda and EC2 to uncover misconfigurations and exposed credentials.
  • Chained SSRF on EC2 to extract instance metadata, pivot credentials and invoke Lambda.
  • Escalated to admin via IAM policy enumeration and high-privilege role assumption.
aws pentesting iam EC2 + SSRF pacu cloudgoat

Certifications

Validated skills — not just lab badges.

01 TCM Security

Practical SOC Analyst Associate

Hands-on SOC operations, incident handling, alert triage and detection engineering.

ID: 170886651 PSAA
02 Udemy

Security+ (SY0-701)

Broad cybersecurity foundation — threats, architecture, implementation and operations.

Security Fundamentals Security+
03 TryHackMe

Web Application Pentesting

Systematic web app security testing — covering different vulnerabilities.

THM-9727D1L7ZP THM
04 Simply Cyber

Hands-On Phishing

Practical phishing simulation design, execution and detection — from attacker perspective.

Phishing Simulation Simply Cyber
05 Simply Cyber

Introduction to AWS Pentesting

Cloud attack surface enumeration and exploitation techniques on AWS environments.

AWS Attack Surface Simply Cyber
06 Postman

API Fundamentals Student Expert

API design, testing, automation and security fundamentals via the Postman platform.

Student Expert Postman

Achievements

Things that say "this isn't just a lab hobby".

01

Speaker — InfraSec Village, Seasides Conference

Delivered a talk on Cloud Pentesting: Recon to Exploitation at InfraSec Village, India's largest security conference.

02

Vice President — HashVault, BNMIT

Co-founded and led BNMIT's cybersecurity club — organising CTFs, workshops and technical events to build campus security culture.

03

Speaker — Null & OWASP Bangalore

Shared knowledge on application security and offensive techniques at Null and OWASP Bangalore chapter meetups.

04

Technical Blog Writer — Medium

Published 10+ technical articles covering web security, API hacking, SOC analysis, YARA, threat intel and AI/LLM security.

05

PSAA Certified — TCM Security

Earned the Practical SOC Analyst Associate certification, validating hands-on SOC operations and incident handling skills.

06

AI / LLM Security Practitioner

Early practitioner in LLM/AI security — real-world client engagements.

Contact

Want me to break something (safely)?

I'm open to VAPT / red team roles, focused app, network assessments, mobile application and LLM/AI security. Happy to collaborate with in-house security teams or external consultancies.

Send me a target scope, constraints and timelines — we can talk about turning that into a realistic engagement.

Available for opportunities · Bangalore, India (IST)