Available for Engagements

Konstantinos Stravomytis

>_ |

Breaking into systems so others don't have to worry about it. Specialist in web, network, and Active Directory offensive security.

scroll
01

About

I'm an offensive security professional with hands-on experience in penetration testing, red team operations, and vulnerability research. My methodology is systematic, thorough, and grounded in real attacker techniques — PTES, OWASP, and MITRE ATT&CK.

I compete regularly in CTFs, hold industry certifications, and assess web applications, internal networks, wireless infrastructures, and Active Directory environments. My goal: find what defenders miss, document it clearly, and help organisations fix it.

OSCP
CEH
eJPT
CompTIA PenTest+
Open to freelance & contract engagements
0 Engagements
0 Vulns Found
0 CTF Flags
0 Yrs Experience
02

Arsenal

Languages

Python
SQL
JavaScript
HTML
CSS
Bash / Zsh
PowerShell

Operating Systems

Kali Linux Primary Attack Platform
Windows AD & Post-Exploitation

Tools

Burp SuiteWeb Exploitation
MetasploitExploitation Framework
Nmap / MasscanReconnaissance
WiresharkNetwork Analysis
Hashcat / JohnPassword Cracking
BloodHoundActive Directory
SQLmapSQL Injection
GobusterDirectory Fuzzing
03

Engagements

Web Application
CRITICAL

E-Commerce Platform Audit

Identified critical SQL injection and broken authentication across a large e-commerce platform, achieving full database compromise and mass account takeover.

  • SQL Injection — CVSSv3 9.8
  • Broken Auth / Session Fixation
  • IDOR — Mass Account Exposure
Internal Network
HIGH

Corporate AD Red Team

Full internal network pentest achieving Domain Admin via AS-REP Roasting and Kerberoasting, with lateral movement through Pass-the-Hash techniques.

  • AS-REP Roasting
  • Kerberoasting — DA Escalation
  • Pass-the-Hash Lateral Movement
Wireless
MEDIUM

Wireless Infrastructure Assessment

Assessed enterprise wireless infrastructure uncovering WPA2 PMKID weaknesses, rogue AP attack vectors, and captive portal bypass techniques across multiple sites.

  • WPA2 PMKID Attack
  • Rogue AP / Evil Twin
  • Captive Portal Bypass
04

Contact

Let's work together

Available for security assessments, red team engagements, CTF teams, bug bounty consulting, and vulnerability research contracts.