S

a

l

a

m

(

)

;

 

I

'

m

H

a

n

z

a

l

a

 

G

h

a

y

a

s

 

A

b

b

a

s

i

I

d

e

t

e

c

t

w

e

a

k

n

e

s

s

&

s

e

c

u

r

e

n

e

t

w

o

r

k

.

Cybersecurity enthusiast with hands-on experience in IT infrastructure, CTF organization, and web application security. PNPT-certified, with strong skills in penetration testing, vulnerability research, and secure software development. Passionate about digital rights and continuous learning.

</AboutMe>

<

I'm Hanzala Ghayas Abbasi, passionate about digital rights and cybersecurity. I have experience in IT infrastructure management, organizing Capture The Flag (CTF) events, web application security, and technical writing. I actively develop skills in penetration testing, vulnerability research, and secure software development.


I contribute regularly to the infosec community through writing and CTF participation, and I am seeking opportunities to apply and further enhance my cybersecurity expertise.

Hanzala Ghayas Abbasi

</Skills>

Tech Stack

  • NMAP
  • METASPLOIT
  • KALI LINUX
  • BURP SUITE
  • WIRESHARK
  • PYTHON
  • OWASP ZAP
  • SQLMAP
  • MALTEGO
  • JOHN THE RIPPER
  • HASHCAT
  • NESSUS

</Projects>

Professional Link website favicon
Cybersecurity Simulation

Tackled advanced CTF challenges on platforms like TryHackMe, HackTheBox, CTFtime, and PortSwigger.

Professional Link website preview image
Web-CTF
Blitzstorm CTF - 2024 Web Challenges

Developed vulnerable web apps to simulate real-world flaws and improve bug hunting skills. Guided participants through complex security challenges and debugging, ensuring strong engagement.

Web challenge
PortSwigger website favicon
PortSwigger Labs Completion

Completed all labs on PortSwigger, gaining in-depth practical knowledge in web application security testing. Developed comprehensive PoC for vulnerabilities identified during the lab exercises, demonstrating proficiency in detecting and addressing web application security flaws.

PortSwigger Dashboard preview image
AD
Active Directory Security Lab

Built and configured a full Active Directory lab on VMware with DNS, DHCP, domain controllers, users, and GPOs. Simulated attacks like password spraying, Kerberoasting, and lateral movement using BloodHound and Mimikatz.

Active Directory
SecureDB
SecureDB Project

Implemented a strong password policy with length and complexity requirements. Enabled real-time login monitoring, mitigated SQL injection with parameterized queries, and secured passwords using bcrypt hashing.

SecureDB
Phishing simulation
Phishing Simulation

Created a database-free phishing simulation to showcase common tactics and prevention methods, offering an interactive learning experience on phishing risks.

Phishing
Custom Password Generator
Custom Password Generator

Developed a secure password generator to enhance user security with complex passwords while ensuring a user-friendly experience.

Custom Password Generator website preview image

</Blogs>

Blog Post 1

My PNPT Certification Exam Review — 2025

Passed the PNPT exam on the first attempt. This post shares my experience, tips, and what to expect during the assessment.

Read More
Blog Post 2

My BlackHat MEA 2024 Qualifiers Journey: Web Write-Ups

A walkthrough of my web challenge solutions for BlackHat MEA 2024 Qualifiers with key techniques and learning takeaways.

Read More
Blog Post 3

Blitzstorm CTF 2024 | Web OFFICIAL Write-Up

Breakdown of the web challenges I authored for Blitzstorm CTF 2024, including vulnerabilities and intended exploitation paths.

Read More
Blog Post 4

Solving the Ignite 2023 CTF Machine: A Step-by-Step Walkthrough

Step-by-step exploitation of an LFI and nginx misconfig to gain access and escalate privileges in the Ignite 2023 CTF machine.

Read More
Blog Post 5

CVE-2023-24329: Understanding the Python urlparse Vulnerability

Explains how improper parsing in `urlparse` can lead to security bypasses, with a focus on CVE-2023-24329 and its impact.

Read More
Blog Post 6

Web Cache Deception: Walkthrough of All Portswigger Labs

Complete guide to solving all Web Cache Deception labs on PortSwigger, with concepts and techniques used in real-world attacks.

Read More
Blog Post 7

Basic Pentesting Writeup | TryHackMe

Covers service enumeration, brute-forcing, and Linux privilege escalation techniques in the TryHackMe Basic Pentesting room.

Read More
Blog Post 8

Devel writeup | Hack the box

Beginner-friendly write-up for HTB’s Devel machine using public exploits to demonstrate misconfigured services and privilege gain.

Read More