🛡️ | Offensive Security Researcher
⚔️ | Penetration Testing Specialist
🛠️ | Red Team Security Developer
✍️ | Cyber Security Content Writer
❤️ I work on Red Team operations and Penetration Testing processes.
📝 I write a technology blog on Medium! https://medium.com/@dogukan.ispirli
📫 To contact me, send an email. dogukan.ispirli08@gmail.com
📄 You can contact us via LinkedIn for more information, https://www.linkedin.com/in/dogukan-ispirli/
I am developing my skills in conducting penetration testing and security audits in the following areas, within the framework of industry standards (OWASP, PTES, NIST, MITRE ATT&CK):
- 🏢 Internal Network Penetration Testing: I conduct research on lateral movement, privilege escalation, Kerberos-based attacks, and domain controller takeover techniques in internal networks.
- 🌍 External Network Penetration Testing: I identify vulnerabilities, open port services, and configuration errors in the organization's internet-facing perimeter.
- 📶 Wireless Network Penetration Testing: I perform security checks for WEP/WPA/WPA2/WPA3 enterprise networks, rogue network attacks, client isolation tests, and wireless network bypass techniques.
- 🌐 Web Application Penetration Testing: Business logic flaws in advanced web architectures, API vulnerabilities, and in-depth vulnerability analysis according to OWASP Top 10 standards.
- 📱 Mobile Application Penetration Testing: Reverse engineering, dynamic/static analysis, and secure data storage evaluations on Android and iOS platforms.
- 🎭 Social Engineering Testing: I measure an organization's security awareness by testing employees' human-related vulnerabilities using phishing, vishing, and similar scenarios.
- 🏢 Physical Penetration Testing: I assess an organization’s physical security by testing unauthorized access scenarios and identifying weaknesses in physical controls.