My Pentesting Space
LinkedIn
  • Welcome to Hackjiji
  • πŸ•ΈοΈweb pentesting
    • Basics
    • Web pentest cheatsheet
    • Burpsuite and browser tricks
    • cUrl cheatsheet
    • CVE exploitation
    • JavaScript Obfuscation/Deobfuscation
  • Network pentesting
    • Basics
    • Nmap favorites
    • Host discovery
    • Port scanning
    • Network Services
      • RPC-NFC
      • WINRM - 5895-5896
      • FTP - 21
      • SMB - 445
      • RDP - 3389
      • SSH - 22
      • SMTP - 25
    • Firewall evasion
    • Pivoting and double pivoting
  • Physical pentesting
    • Bad USB - Rubber Duckies
  • Linux pentesting
    • Usefull command's
    • Privilege escalation
  • windows pentesting
    • Windows useful commands
    • Windows Reverse shell codes
    • Privilege escalation
  • Active Directory pentesting
    • Basics
    • AD
    • AAD
  • General
    • Hash cracking
    • Wordlist
    • Encoding/decoding
    • Environment setup
      • Install a new OS on seperated boot sector
      • Hyper-V
      • Virtualbox
    • Reverse-shell-cheatsheet
    • Metasploit cheatsheet
    • Vulnerability research
    • My scanning methodology
  • Events
    • HackTheBox Meetup - LFI2RCE
    • Radio Equans - QR Code Awareness campaign
    • Cybersecurity job campaign
Powered by GitBook
On this page
  • #Whoami
  • My Journey in Cybersecurity
  • My achievements and Education
  • My contributions
  • Disclaimer

Welcome to Hackjiji

NextBasics

Last updated 5 months ago

Welcome to my pentesting space! Here, you'll have access to all my notes, derived from personal experience, various trainings, CTFs, but also from other resources as well, Kudos to everyone that shares cybersecurity content.

Cybersecurity is fundamentally about community and sharing. I firmly believe that by collaborating within the global cyber community, we can contribute to a safer future. It all begins with sharing knowledge to strengthen community awareness and understanding of cybersecurity.


#Whoami

Hello! My name is Jihane, also known as HackJiji, and I am thrilled to share a bit about myself and my passion for cybersecurity with you. By nature, I am someone who is constantly eager to try and learn new things. I find that I get bored very quickly if I'm not engaged in some form of continual learning or exploration. This inherent curiosity drives me to seek out new challenges and pushes me to expand my knowledge and skill set continuously.

I've been in the IT sector for over 11 years. After graduating in 2013 in computer science with network specialization, I started in the IT support field, as a IT support Engineer. Now, I specialize in cybersecurity with a particular focus on the offensive part. This passion for offensive security stems from a lifelong fascination with uncovering the unknown and understanding systems on a deeper level. I am intrigued by the hidden parts of things, seeking to unravel the mysteries of how systems operate behind the scenes. This curiosity has led me to delve into various systems, wanting to unveil how they function and interact.

My love for cybersecurity isn't just about understanding how systems work; it's about uncovering the logic that drives these systems and exploring how this logic can potentially be manipulated. I have always been captivated by the way tools are designed and the intricate logic nestled within code. To me, offensive security is a puzzle, one that involves dissecting these layers and testing the boundaries of what is possible within a system.

The dynamic nature of the cybersecurity field aligns perfectly with my need for continuous learning and exploration. Whether it's staying updated with the latest security trends, understanding new vulnerabilities, or mastering cutting-edge tools and technologies, there is always something new to discover. This ongoing learning journey fuels my passion and keeps me engaged, allowing me to innovate and adapt in an ever-evolving landscape.

Thank you for taking the time to learn a little about me and my journey in cybersecurity. I'm enthusiastic about what lies ahead and the endless possibilities for learning and growth in the cybersecurity world.


  • Bachelor's Degree in Computer Science (2012 - 2015)

  • Redhat System Administration Linux II (2015)

  • Microsoft - Azure Fundamentals (2021)

  • EC Council - CEH (2022)

  • EC Council - CEH Master (2023)

  • EC Council - CPENT (2024)

  • EC Council - LPT Master (2024)


  • CVE-2024-45077 - IBM Maximo Asset Management - Unrestricted File Upload vulnerability

Security Bulletin: IBM Maximo Asset Management application is vulnerable to unrestricted file upload (CVE-2024-45077)

  • CVE-2024-45652 - IBM Maximo Asset Management - Directory Traversal vulnerability

Security Bulletin: IBM Maximo Asset Management application is vulnerable to allow a remote attacker to traverse directories on the system. (CVE-2024-45652)

Disclaimer

All content provided in my pentesting space is for educational purposes only. Using this knowledge for illegal activities or targeting systems that you do not own is prohibited by law. I am not liable for any damage you may cause!

LinkedIn: https://linkedin.com/in/hackjiji

Blog: https://docs.hackjiji.org/

My Journey in Cybersecurity

My achievements and Education

My contributions

πŸ”—
πŸ•ΈοΈ
πŸ‘©β€πŸ’»
πŸŽ“
🌟
Page cover image