Next, I list some of the knowledge that I have.

Security

AuditsFirewalls and IDSMethodologiesTools

How to perform a complete technical audit process.

  • External audit
  • Internal audit
  • Web audit
  • Wirelles audit
  • Pentesting
  • Post-explortation and Pivoting
  • Social engineering attacks

Use, configuration and installation at the software and hardware level and evasion techniques of these systems.

  • Palo Alto
  • Check Point
  • PFSense
  • Alien Vault y OSSIM
  • SELKS
  • Kismet
  • Suricata
  • Mod security
  • OSSEC

Knowledge and use of the following methodologies.

  • OWASP
  • OWISAM
  • PTES
  • Documentation and maitenance of my own “methodology”

  • Risk analysis Magerit using Pilar tool

Some of the tools that I dominate and consider most relevant.

  • Burpsuite
  • Metasploit
  • Nessus, OpenVas y Nexpose
  • PRET
  • Beef
  • Kali Linux, Parrot
  • Aircrack suite
  • OSINT: google hacking, shodan, harvesting, etc
  • Sqlmap
  • GDB, Inmunity debugger

Development

LanguagesFrameworksProjects
  • Python
  • Java
  • Android native
  • C y C++
  • PHP
  • Javascript
  • Bash scripting

Some of the frameworks or technologies based on other languages ​​that i use.

  • Django
  • Scapy
  • Servlets and Spring
  • Frameworks PHP: Synfony, Laravel, Code Igniter, etc
  • Totem – Host IDS
  • SilverShield – arp spoofing detector for android
  • Framework MVC, PHP

Redes

BasicsNetworking
  • TCP/IP in deep
  • LAN y WAN architectures
  • IPv6
  • GSM y UMTS
  • SS7
  • IPsec
  • Network architectures hardening
  • Firewall management
  • IP tables
  • Management of devices , routers,  switches, aps, etc
  • VPNs
  • SSH tunnels