itskilltroll
- 6nodes
- 8years
Ali Omar Alaskari
Founder, Chief Creative Visionary & Developer of Solnyshko Jewellery.
Penetration Tester || Operations Coordinator , OSCP / CEH / NSE / Web3 / N8N Workflow
Nmap | Advanced Network Discovery & Vulnerability Auditing
PORT STATE SERVICE
22/tcp open ssh
8080/tcp open http-proxy
8080/tcp open http Apache Tomcat 9.0.16
| VULNERABLE:
| Apache Tomcat CGI Remote Code Execution
BloodHound | Active Directory Graph Trust Auditing
[+] Output file generated: 20260516_BloodHound.zip
Burp Suite Professional | Web Infrastructure Exploitation
> X-User-ID: 1004
{"status": "success", "username": "corporate-CEO", "api_key": "sec_prod_99182"}
Metasploit Framework | Remote Code Execution (RCE) Pipeline
Sqlmap | Automated Database Injection Testing
[*] information_schema
[*] production_user_vault
$stmt->execute(['id' => $id]); [REMEDIATION] SQL command instructions separate from input fields. Payload input treated purely as data strings.
Wireshark | Transport Sniffing & Data Extraction
Responder | Link-Local Resolution Poisoning Audit
jdoe::CORP:4b22a1f8...:e10b948
Wireless Exploitation & 802.11 WPA/WPA2 Audit
AA:BB:CC:DD:EE:FF 6 WPA2 PSK Corporate_HQ_WiFi
Mimikatz | OS Memory Credential Extraction
[*] NTLM-hash : 2b576ac5d912440c9ae70678912e865c
Hydra | Multi-Protocol Network Authentication Tester
[ATTEMPT] login "operator" - password "shadow1" - 15 of 10000
Hashcat | GPU-Accelerated Cryptographic Recovery
Hash.Password....: SecOpsManager2026! (Status: Cracked)
John the Ripper | Local System Password Auditing
password123 (root)
BurpSuite
Auditing web application security by intercepting and analyzing live traffic.
Metasploit
Executing modular exploits and managing payloads for full-scale penetration tests.
Wireshark
Analyzing network protocols and diagnosing infrastructure traffic bottlenecks.
Wireless Security
Assessing Wi-Fi resilience using Aircrack-ng, Airegeddon, and Hashcat.
Hashcat
Testing cryptographic hash strength and password security policies.
Full-Stack Dev
Architecting secure web applications with modern frontend frameworks.
PRODUCTION_INFRASTRUCTURE_MONITOR
Topological map tracking interactive real-world pipeline assets initialized. Select any environment module or active storage layer instance to verify routing paths, protection systems, and deployment loops.
Founder & Chief Creative Visionary & Developer
With an exceptional eye for classical luxury and modern form, AliOmar leads the artistic direction, turning avant-garde concepts into iconic, production-ready jewelry architectures.
SoloMedic Platform Development
- Platform Architecture: Designed the digital foundation for SoloMedic, focusing on a premium UI and healthcare-centered logic.
- Financial Integration: Implemented secure payment systems for local Iraqi banking (FIB, Super Qi) and international USDT/Crypto.
- Automation & AI: Leveraged n8n and Gemini API to streamline platform workflows and content generation.
- Asset Security: Configured Cloudflare WAF rules to protect proprietary platform data and prevent unauthorized access.
- Sponsorship Framework: Engineered a scalable tiered system to facilitate and manage diverse healthcare funding opportunities.
- DNS Management: Configuration and optimization of Domain Name Servers and DNS zones using Bind9 and Unbound.
IT Engineer — Support & Administration
Network Infrastructure & Hardware Deployment
- Infrastructure Design: Expert in network rack integration, including structured cabling, professional wiring, and ongoing hardware maintenance.
- Hardware Implementation: Proficient in the installation and configuration of network-attached resources, including NVRs, NAS systems, and IP-based peripherals.
- Telecommunications: Experience in the deployment and configuration of Panasonic PBX systems.
Systems Administration & Identity Management
- Local SEO Infrastructure: Orchestrated enterprise Google Business Profile (GBP) localized footprint management for multiple bank branches, aligning localized branch infrastructure with public identity directories to increase organic digital discoverability and maintain branch structural telemetry.
- Directory Services: Advanced management of Azure Active Directory and on-premises Windows Domain environments, including user/computer object administration and Group Policy enforcement.
- Endpoint Management: Managed centralized update deployment via WSUS to ensure enterprise-wide security compliance.
- Multi-Factor Authentication: Implementation of FortiAuthenticator tokens to secure domain access.
Network Services & Storage Solutions
- Storage & Redundancy: Comprehensive administration of QNAP NAS devices, including data redundancy (RAID), backup scheduling, and user access restrictions.
- System Monitoring: Proactive oversight of network health, monitoring servers, desktops, and storage devices to ensure maximum uptime.
Technical Support & Troubleshooting
- L2/L3 Support: Providing high-level technical assistance by identifying, investigating, and resolving complex hardware and software bottlenecks.
Offensive Security & Ethical Hacking
- Adversarial Simulation & Web Exploitation: Conducted comprehensive penetration testing across various Operating Systems (Windows/Linux) and web applications; identified and exploited high-severity vulnerabilities including Local File Inclusion (LFI), Directory Traversal, and Open Redirect flaws.
- AV Evasion & Payload Development: Developed custom obfuscation and encryption techniques to evaluate the effectiveness of Anti-Virus (AV) and Endpoint Detection and Response (EDR) solutions.
- Active Directory Exploitation: Executed advanced post-exploitation techniques, including Privilege Escalation, Lateral Movement, and Kerberoasting, to assess AD forest security.
- Exploitation Frameworks: Proficient in executing Remote Code Execution (RCE) and shell management within controlled testing environments.
Network & Wireless Security
- Traffic Analysis & Man-in-the-Middle (MITM): Performed deep-packet inspection, packet sniffing, and network spoofing (ARP/IP); utilized SSL Stripping to evaluate the integrity of encrypted communication channels.
- Wireless Security Auditing: Assessed wireless infrastructure resilience by simulating Evil Twin attacks, captive portal phishing, and Denial of Service (DoS) scenarios.
- RF & Cellular Security: Utilized SDR (Software Defined Radio) tools like HackRF for IMSI analysis and signals intelligence research.
Defensive Security & Infrastructure
- Threat Intelligence & Deception: Deployed and managed Honeypots to track adversary tactics, techniques, and procedures (TTPs) for proactive threat mitigation.
- Zero Trust Architecture: Orchestrated secure remote access and identity-verified networking using Twingate (ZTNA).
- Load Balancing & High Availability: Managed enterprise-grade traffic distribution and application delivery via Kemp Load Balancers.
Bachelor of Engineering
Specialization: Computer Networking Specialist. Mosul, Iraq.