πŸ‘‹ Hi, I’m @ewanoleghe – Cybersecurity Analyst & Offensive Security Engineer


SOC Analyst | Penetration Tester | OT/ICS Security Enthusiast
Former full-stack developer with 15+ years in secure software engineering, now focused on threat detection, incident response, penetration testing, and operational technology (OT) security. Certified in CompTIA Security+ and AWS Cloud Practitioner, actively pursuing OSCP and CySA+.


Cybersecurity Expertise


Active Labs & Red Team Training


Currently Mastering


MITRE ATT&CK in Practice

Tactic Technique Application
Initial Access T1190 – Exploit Public App Laravel debug mode β†’ RCE
Execution T1059.006 – Python Reverse shell via cron
Persistence T1053 – Scheduled Task at job + encoded payload
Privilege Escalation T1068 – Kernel Exploit Dirty COW, SUID binary
Defense Evasion T1070.004 – Log Clear shred, wevtutil cl
Lateral Movement T1021.001 – RDP Pass-the-Hash + RDP
Exfiltration T1041 – C2 Channel DNS tunneling, HTTPS POST

OSCP Preparation Guide (90-Day Roadmap)

Phase 1: Foundation (Weeks 1–3)

Phase 2: Methodology (Weeks 4–6)

nmap -sC -sV -p- --min-rate 1000 -oA scan <IP>
gobuster dir -u http://<IP> -w medium.txt -x php,html,txt

Let’s Collaborate On


Reach Me

Twitter (@e_oleghe)
ewan.mails -{at}- gmail -|dot|- com

alt text | alt text


Cybersecurity & Tools Arsenal

AWS Python Splunk Microsoft Sentinel Carbon Black Metasploit Burp Suite Nmap Wireshark Docker Kali Linux