100
09:26:20 (UTC/GMT +03:00)
Krasnodar
connect
connect
the website is my personal security map:
core skills, hands-on experience, and future direction.
explore how digital systems work, fail, and get abused —
to understand how to protect them better.
connect
Cybersecurity starts with understanding systems, a not tools.
  • CORE
Not the ability to “hack”,
but the ability to control
and predict system behavior
Just look around...
This applies not only to the world of digital architecture.
OSINT > RECON
other
Web Applications..
crypto
areas:
Главное:
other
web
[ information gathering ]
(ACTIVE / PASSIVE)
/ explore arch.
/ vulns
/ exploitation
/ explore arch.
/ vulns
/ exploitation
/ traffic
/ check logs

/ Cryptocurren.
/ Anomymity && privacy mechan.
/ S.Engineering
  • EXPERIENCE
Focus on
Experience comes from working with complex
and sometimes non-standard digital environments.

analyzing system behavior, vulnerabilities,
and misuse patterns — both technical and human.
This background helps me understand not only how systems
should work,
but also how they are actually used and abused...
[01]
Analysis of unusual digital scenarios and threats

[02]
Research of system logic flaws and weak points
/ Web and software vulnerability analysis

/ Understanding behavioral and economic aspects of cyber risks

/ Studying malicious mechanisms in controlled and educational environments
Focus areas:
[ 03 ]

Executing the PLAN
[ 04 ]

Evaluating the RESULT
[ 02 ]

Selecting Tools
[ 01 ]

Formulating the PLAN X
  • process
and more
[ 07 ]

DISTRIBUTION
DB's, logs, cards, accs, crypto....
& etc
[ 06 ]

PERSISTENCE
Inj. a backdoor 2the system
for the possibility of return
[ 05 ]

PRIVILLEGE ESCALATION
Achieving privilege escalation on the attacked system
[ 04 ]

GETTING ACCESS
&& EXPLOITING
Testing adjustments, attack and exploitation...
[ 03 ]

TESTING
Research arch and study of results, correcting the PLAN X
[ 02 ]

OBSERVE
&&
SCANNING
Analyze behavior:
network, web, traffic, actions, logs
and data flow
[ 01 ]

OSINT
–> information gathering
process
Explore the system architecture of target
viva la libertad
TOX
JABBER
MATRIX
TG
© SIENNA. All rights reserved
[ !NO HELLO ]

Html code will be here