Anirudh Taywade - Cybersecurity Enthusiast | Web Developer | Security Labs Practitioner

Information Security graduate with experience in web development and hands-on cybersecurity labs. Skilled in web application security testing, vulnerability analysis, and network investigation. Actively practice Capture The Flag (CTF) challenges and vulnerable web application labs.

My goal is to develop strong skills in vulnerability discovery, exploitation, and secure system design.

    SKILLS
  • Web Application Security
  • Vulnerability Assessment
  • Network Traffic Analysis
  • SIEM Monitoring
  • Identity and Access Management
  • Secure Coding Practices
  • Web Development (HTML, CSS, JavaScript, PHP)
    Learning Goals
  • Learn advanced web exploitation
  • Study binary exploitation
  • Participate in more CTF competitions
  • Explore bug bounty programs

Web Application Security Lab

    Enviroment
  • Kali Linux Virtual Machine
  • Damn Vulnerable Web Application
  • bWAPP
  • OWASP Juice Shop


  • Areas covered
  • SQL Injection
  • Cross-Site Scripting
  • Command Injection
  • Brute Force attack
  • XSS (stored and reflected)
  • SQL Injection
  • Insecure authentication

Outcomes

  • Learned penetration testing methodology
  • Improved command-line proficiency
  • Practiced exploiting vulnerabilities using Burp Suite
  • Developed understanding of secure coding practices
  • Improved ability to identify application weaknesses
  • Practiced testing web application security
  • Learned techniques used in penetration testing
  • Practiced attacking vulnerable applications in a controlled environment.

picoCTF

    Areas Covered
  • Web exploitation
  • Cryptography
  • Forensics
  • Binary exploitation
  • Reverse engineering


  • Example challenges solved:
  • Base64 decoding challenges
  • SQL injection login bypass
  • Hidden flag discovery in web pages

Outcomes

  • Developed problem-solving skills for CTF challenges
  • Learned to identify common web vulnerabilities
  • Improved understanding of encoding, hashing, and encryption
  • Practiced using command-line security tools
  • My Profile

    Try Hack Me

      Areas Covered
    • Linux fundamentals
    • Network scanning
    • Privilege escalation


    • Example challenges solved:
    • File permissions
    • User management
    • Port scanning
    • OS fingerprinting
    • Security Misconfiguration

    Outcomes

  • Stronger understanding of Linux systems
  • Learned how security tools operate in Linux environments
  • Practical experience in penetration testing workflows
  • Hands-on practice exploiting vulnerable machines
  • My Profile
    Tools Practiced
    • Burp suite
    • Wireshark
    • Nmap
    • gbd
    • objdump