Hi, I'm Tanush Kushwah
Information Security,Penetration Testing
Learning • Breaking • Securing — Responsibly
Get in Touch Download ResumeLearning • Breaking • Securing — Responsibly
Get in Touch Download Resume
I am Tanush Kushwah, a quick learner with strong adaptability to new tools and technologies, driven by a deep interest in offensive security and creative as well as hunger to learn. I approach vulnerability discovery and security testing with a detail-oriented mindset, ensuring accurate identification, analysis, and reporting of security issues.
With strong problem-solving and analytical thinking skills, I am able to break down complex security challenges into practical and effective solutions. As a self-driven and disciplined learner, I continuously work on improving my technical expertise and expanding my knowledge in cybersecurity and I am comfortable working independently as well as collaboratively within a team environment and consider myself an efficient team player.
My latest articles on cybersecurity and technology
Wireless networks are a common target for attackers due to their broadcast nature. This blog post guides you through the penetration testing of WPA/WPA2 Wi-Fi networks using Aircrack-ng — a powerful open-source suite used to assess Wi-Fi network security.
Read on Medium“Oh no! Something has gone wrong. A problem has occurred and the system can’t recover.” This often appears due to a crash in the GNOME desktop environment, missing display drivers, or broken packages.fix it using Rescue Mode from GRUB.
Read on MediumLDAP (Lightweight Directory Access Protocol) is an open, vendor-neutral protocol used to access and manage directory information over a network. A directory in this context is a hierarchical database optimized for reading, searching, and managing information about users, groups, systems, and resources.
Read on Medium
Issued by: Armour Infosec
Date: June 16, 2025
Issued by: Armour Infosec
Date: December 2, 2024
Issued by: Armour Infosec
Date:June 25, 2025
Interested in collaborating or discussing cybersecurity research? Feel free to reach out.