Web Security
Testing and hardening web apps against common attack paths like injection, auth bypass, and session abuse.
Cybersecurity + Technology
I build skills by solving capture-the-flag challenges and lab scenarios across web, cloud, and defensive disciplines. I document what I learn and focus on practical, repeatable techniques.
Focus
CTFs + Defensive Security
Specialties
Defensive, Forensics, Networking
Location
Open to remote
Focused on deliberate practice and continuous learning.
I work through curated labs and CTFs to strengthen fundamentals in exploitation, detection, and incident response. My goal is to turn every challenge into a clean writeup, a reusable workflow, and a lesson that improves the next engagement.
Challenge areas I focus on and actively practice.
Testing and hardening web apps against common attack paths like injection, auth bypass, and session abuse.
Reverse engineering and exploiting native binaries with a focus on memory corruption and control flow.
Analyzing ciphers, protocols, and implementation mistakes to uncover weaknesses and recover secrets.
Collecting and analyzing host, memory, and log artifacts to rebuild timelines and attacker activity.
Understanding protocols and traffic patterns to troubleshoot, detect anomalies, and validate security controls.
Static and dynamic analysis to profile malicious behavior, IOCs, and persistence mechanisms.
Strengths I bring to challenges and investigations.
Breaking down complex challenges into repeatable steps and wins.
Using the right tool for recon, exploitation, and analysis.
Clear documentation of steps, fixes, and lessons learned.
How I approach challenges end-to-end.
Map the target, identify entry points, and confirm assumptions.
Test hypotheses, validate vulnerabilities, and capture proof.
Write a clear report, note remediation, and catalog techniques.
Competitions and events I have joined.
Areas I focus on when solving challenges.
Let us build something secure together.
ian@mattas.net
GitHub
github.com/imattas