ꓮꓲех ꓮցոісk | Cyber Operations Enthusiast | Penetration Tester
About Me
Hi, I’m ꓮꓲех ꓮցոісk, a dedicated Cyber Operations student at the University of Arizona with a passion for red teaming, penetration testing, and offensive cybersecurity strategies. With experience in both digital and physical security, I specialize in uncovering vulnerabilities and developing innovative solutions to protect critical systems. My ultimate goal is to apply my skills in a way that serves my country one day.
Education
- Associate’s Degree – Cybersecurity – Emphasis in Cyber Operations – Mesa Community College
- Mesa CC Transcript: https://drive.google.com/file/d/1XWMoUJqRF5kH8tTsrwQk3hahvgG-U8ig/view?usp=sharing
- B.S. in Cyber Operations (In Progress) – University of Arizona
Specializing in Defense and Forensics. - Certificate in Information Warfare (In Progress) – University of Arizona
- University of Arizona Transcript: https://drive.google.com/file/d/1b830HwRO2Zjs3rA7UqFQr76kHdGztfdW/view?usp=sharing
Certifications
Exterro ACE Certified
https://drive.google.com/file/d/14wdDJ4rAr1z1AdVigsk5cHqI70c46_XH/view?usp=drive_link
Comptia SecurityPro Graduate
(No Certificate Given, Grade of A given for class in MCC transcript)
AWS Architect Graduate
https://drive.google.com/file/d/1eiGMdAC2bFBGORyoQMRXak4fPbs5zL_f/view?usp=sharing
FCC Technician License
https://www.qrzcq.com/call/KK7OUF
Public Speaking Engagements
- Delivered a presentation on reverse shells and their practical applications
- Presentation is here: https://docs.google.com/presentation/d/1-EgwQKPkELY8NGs9y8_1KF_x9RLMVmWPGi2zX_bXYmY/edit?usp=sharing
- Delivered a presentation on using OSINT tools to track targets and gain information, Non Destructive Entry and Covert Methods of Entry tools, Using Malicious USB cables to implant a forged certificate on a system, then used directional antennas to intercept encrypted emails.
- Presentation is here: https://docs.google.com/presentation/d/1OPK-oDDYZDcpRI2ArPPr8Xekp61v_HwEzNuExDGobK4/edit?usp=sharing
Skills & Expertise
Technical Skills
- Penetration Testing (Web, Network, and Application)
- Vulnerability Scanning and Exploitation
- Wireless Network Hacking (Wi-Fi Penetration Testing)
- Reverse Engineering Software and Firmware
- Limited Malware Analysis and Payload Development (Limited Experience with Programming Languages)
- Incident Response and Forensics Analysis
- Social Engineering Techniques (UofA has one of the best instructors in existence)
- DNS Poisoning and Spoofing
- Network Traffic Analysis with Wireshark
- Packet Injection and Manipulation
- Setting Up and Exploiting Reverse Shells
- Custom Exploit Development
- Advanced Use of Metasploit
- Bypassing Antivirus and Endpoint Detection Platforms (including covert sidechannel exfiltration of intelligence)
- Advanced Cryptographic Techniques
- OSINT (Open Source Intelligence) Investigations
- Steganography and Data Hiding Techniques
Hardware and Electronics
- Building Long-Range RFID and NFC Cloning Devices
- Performing PCILeech Evil Maid Attacks through a Direct Memory Access Attack via PCIE or Thunderbolt
- Basic Circumvention of BIOS Access Control Measures
- Familiar with Panasonic Toughbook FZ55 Hardware Disassembly, Modification and Reassembly
- Circumvention of Tamper Evident Seals, Devices and Packaging using specialized tools (IE Heat Gun, Tamper Tweezers, Etc.)
- Designing Custom Hardware for Exploits
- Signal Interception with RTL-SDR and HACKRF
- Night Vision Repair (I have fixed a Gen3 Monocular)
- Creating EMP Devices for Testing Shielding
- Developing Encrypted Radio Communication and Tracking Systems
- Customizing Rubber Ducky Payloads for Advanced Use Cases
- Designing Keyloggers and Hardware Implants
- Exploiting Several Physical Access Control Systems by using Master Key (IE DK16001) and shorting specific circuits
- Building and Programming Custom Red Team Platforms using Raspberry Pi
- Wiegand Protocol Interception and Exploitation
Physical Security
- Non-Destructive Entry (NDE) Techniques
- Covert Lockpicking and Bypass Methods
- Forensic Locksmithing
- Bypassing Electronic Locks and Keypads using UV, Thermal and Wiegand Bypasses
- Differential Power Analysis Attacks for Electronic Safes
- Improvised Entry Tools Fabrication and Disguising for Corporate Security Checkpoints
- Tensioning Techniques for Advanced Locks
- Covert Surveillance Equipment Deployment
- CMOE for Physical IT Infrastructure (Server Rooms, Cabinets)
- Securing Physical Access to Critical Infrastructure
Cyber Operations
- Crafting Advanced Phishing Campaigns
- Performing Red Team Assessments
- Cyber Threat Intelligence Gathering
- Exploiting IoT Devices and Embedded Systems
- Privilege Escalation on Linux and Windows Systems
- Creating Obfuscated PowerShell Scripts for Penetration Testing
- Cloud Security
- Exploiting Active Directory Misconfigurations
- Writing and Using Custom Python Scripts for Reconnaissance
- Side-Channel Attacks on Systems and Applications
Other Unique Skills
- Designing and Deploying Honeypots (limited – PFSense Platform)
- Building CTF Challenges and Labs
- Linux System Hardening
- Engineering Physical Test Environments for Training
- Setting Up Hidden Networks for Covert Communication
- Advanced Data Recovery Techniques
- Exploiting Legacy Systems and Protocols
- Physical Evidence Collection for Digital Forensics including forensic locksmithing
Soft Skills
- Writing Legal-Grade Technical Reports for Incident Response
- Drafting NDA-Compliant Security Findings
- Managing Cross-Functional Teams for Security Projects
- Teaching Cybersecurity Concepts to Non-Tech Audiences
- Applying Creative Problem-Solving in Security Challenges
Projects
Penetration Test
https://drive.google.com/file/d/1JbM-cAebrUjeWDIFhR7wE4cyax__tzzl/view?usp=sharing
Conducted a documented penetration test for a real-world environment, identifying vulnerabilities and creating actionable security recommendations. Tools included customized hardware and advanced exploitation techniques.
Reverse Shell Setup Guide
Authored a fun and educational paper on reverse shells, focusing on HUMINT applications and ethical usage. The guide was designed to be practical, engaging, and college-appropriate.
Hardware Innovation Projects
- Built long-range Wiegand interception devices for physical security research.
- Developed encrypted radios, tracking devices and experimented with signal interception using custom tools.
- Developed numerous tools specifically for a Penetration Test.
Experience
- Conducted real-world physical penetration tests, combining NDE, CMOE, Hotplug and Implant tools.
- Drafted legal and technical documents, leveraging years of experience in a law firm to create Chimi Security Professionals.
- Given Multiple Presentations on a variety of Cyber Operations topics.
- Attended numerous Cybersecurity related events.
Achievements
- Capture The Flag Participant: I complete many Capture The Flag challenges for fun, honing skills in network exploitation and ethical hacking. I particularly enjoy ones that are set up by the DOD.
- Lockpicking Mastery: Successfully picked a purple belt-level lock, demonstrating expertise in Non-Destructive Entry (NDE).
- Penetration Test: I have successfully completed a penetration test
- Mad Scientist: I am consistently building and developing new tools to use for future assessments.
Contact Me
Let’s Connect:
- Email: aꓲехaցոісk@gmail.com
- (You must type this email manually, it will not work if copied and pasted)
- Phone: 321-205-6584

