Penetration Tester & Security Analyst with a hands-on trajectory in red team operations,
web application testing, and AD exploitation. Interning at Cynox Security LLP, CyberYaan
& GPCSSI (Haryana Police). Pursuing HTB CPTS & CRTO.
All work is legal, authorized, and white-hat.
Name: Harjinder Singh (aka Ankit)
Handle: h4rj1nd3r51ngh
Location: Ludhiana, Punjab, India
University: GNA University
I'm a cybersecurity enthusiast transitioning from academic learning to real-world professional application. I operate within legal penetration testing teams, performing full-stack offensive security assessments — from initial reconnaissance to exploitation and reporting.
Currently interning at Cynox Security LLP, CyberYaan, and working as a Cyber Warrior Intern at GPCSSI (Haryana Police). I believe in hands-on, lab-based skill building and pursue certifications that reflect real-world competency.
All cybersecurity work described here is authorized, legal, and white-hat.
Hands-on penetration testing across web, network, and AD environments. Conducting authorized VAPT engagements, writing detailed security reports, and collaborating on red team exercises.
Supporting security operations including vulnerability assessment, web application testing, and threat analysis. Assisting senior analysts with penetration test documentation and client communication.
Working with the Government of Haryana's Cyber Security unit. Exposure to law-enforcement grade cybercrime investigation workflows, digital forensics, and threat intelligence practices.
Pursuing a Bachelor of Technology in Cybersecurity. Active participation in CTF competitions, security labs, and research projects on offensive and defensive security topics.
Built a local AD lab (Windows Server 2019 + endpoints) and chained: Kerberoasting → Pass-the-Hash → DCSync → Domain Admin compromise. Documented full attack path and mitigations.
Full VAPT assessment on DVWA and a custom PHP app. Identified and exploited SQLi, XSS, IDOR, File Upload bypass, Command Injection. Wrote a professional-grade findings report.
Python-based OSINT automation tool that aggregates data from multiple sources (Shodan, DNS, WHOIS, social scraping) to build a target profile. CLI-driven with JSON output for reporting.
Captured and analyzed PCAP files from a simulated corporate network. Identified lateral movement, C2 beaconing, data exfiltration patterns using Wireshark + custom Python parsers.
Researched and tested various web shell upload techniques against hardened environments. Built a test harness to validate WAF bypass methods and document server-side persistence mechanisms.
Simulated a cybercrime investigation for GPCSSI internship — disk imaging, memory forensics with Volatility, timeline analysis, evidence chain-of-custody documentation.
Hands-on, lab-based certification covering the full pentest lifecycle. Target completion: mid-2026 (3–4 month path).
Advanced red team adversary simulation certification using Cobalt Strike tradecraft. Currently reviewing course material — 37% complete.
Government-certified cyber warrior training covering cybercrime investigation, digital forensics, and law-enforcement security protocols.
Bachelor of Technology with focus on offensive and defensive cybersecurity. Active in CTF competitions and security research labs.
Exploited time-based blind SQLi in a login form to dump credentials, then leveraged INTO OUTFILE to write a PHP web shell. Escalated to RCE via Metasploit reverse shell.
Classic stack buffer overflow with NX enabled. Chained ROP gadgets to call system("/bin/sh") using leaked libc base from a format string vulnerability in the same binary.
Extracted credentials from unencrypted HTTP POST in a noisy 12MB PCAP. Flag was base64-encoded inside a custom X-Auth-Token header, found using Wireshark display filters.
Two ciphertexts encrypted with the same XOR key. Used crib dragging with common English phrases to recover the keystream and decrypt both messages. Classic OTP misuse.
Hidden flag encoded in least-significant bits of a PNG image. Extracted using custom Python PIL script after noticing irregular noise patterns in the alpha channel.
Identified service accounts with SPN, requested TGS tickets, cracked offline with Hashcat. Leveraged cracked credentials to perform Pass-the-Hash and reach Domain Admin via DCSync.
A deep dive into chaining common AD misconfigurations — Kerberoasting, AS-REP Roasting, ACL abuse, and DCSync — into a full domain compromise walkthrough.
Walking through each OWASP Top 10 category with real exploitation demos in a lab environment — from SQLi and IDOR to SSRF and Security Misconfiguration.
How to conduct zero-footprint OSINT — aggregating Shodan data, WHOIS lookups, LinkedIn dorks, Google hacking, and Maltego graphs to build a comprehensive target profile before any active scanning.
Practical guide to acquiring and analyzing memory dumps using Volatility 3 — process injection, malware artifacts, credential extraction, and timeline reconstruction.
"Harjinder's dedication to learning and his methodical approach to AD exploitation is impressive for someone at his stage. He approached our internal CTF with the mindset of a seasoned professional."
"Sharp analytical skills and a genuine passion for cybersecurity. Harjinder consistently went beyond the assigned scope to understand the underlying mechanisms of each vulnerability."
"A committed and technically sound intern. His understanding of digital forensics workflows and evidence handling was solid. Looking forward to seeing his progression as he pursues CPTS."