Welcome to Hackjiji
Last updated
Last updated
Welcome to my pentesting space! Here, you'll have access to all my notes, derived from personal experience, various trainings, CTFs, but also from other resources as well, Kudos to everyone that shares cybersecurity content.
Cybersecurity is fundamentally about community and sharing. I firmly believe that by collaborating within the global cyber community, we can contribute to a safer future. It all begins with sharing knowledge to strengthen community awareness and understanding of cybersecurity.
Hello! My name is Jihane, also known as HackJiji, and I am thrilled to share a bit about myself and my passion for cybersecurity with you. By nature, I am someone who is constantly eager to try and learn new things. I find that I get bored very quickly if I'm not engaged in some form of continual learning or exploration. This inherent curiosity drives me to seek out new challenges and pushes me to expand my knowledge and skill set continuously.
I've been in the IT sector for over 11 years. After graduating in 2013 in computer science with network specialization, I started in the IT support field, as a IT support Engineer. Now, I specialize in cybersecurity with a particular focus on the offensive part. This passion for offensive security stems from a lifelong fascination with uncovering the unknown and understanding systems on a deeper level. I am intrigued by the hidden parts of things, seeking to unravel the mysteries of how systems operate behind the scenes. This curiosity has led me to delve into various systems, wanting to unveil how they function and interact.
My love for cybersecurity isn't just about understanding how systems work; it's about uncovering the logic that drives these systems and exploring how this logic can potentially be manipulated. I have always been captivated by the way tools are designed and the intricate logic nestled within code. To me, offensive security is a puzzle, one that involves dissecting these layers and testing the boundaries of what is possible within a system.
The dynamic nature of the cybersecurity field aligns perfectly with my need for continuous learning and exploration. Whether it's staying updated with the latest security trends, understanding new vulnerabilities, or mastering cutting-edge tools and technologies, there is always something new to discover. This ongoing learning journey fuels my passion and keeps me engaged, allowing me to innovate and adapt in an ever-evolving landscape.
Thank you for taking the time to learn a little about me and my journey in cybersecurity. I'm enthusiastic about what lies ahead and the endless possibilities for learning and growth in the cybersecurity world.
Bachelor's Degree in Computer Science (2012 - 2015)
Redhat System Administration Linux II (2015)
Microsoft - Azure Fundamentals (2021)
EC Council - CEH (2022)
EC Council - CEH Master (2023)
EC Council - CPENT (2024)
EC Council - LPT Master (2024)
CVE-2024-45077 - IBM Maximo Asset Management - Unrestricted File Upload vulnerability
CVE-2024-45652 - IBM Maximo Asset Management - Directory Traversal vulnerability
LinkedIn:
Blog: