Hi, I'm Tanush Kushwah

Information Security,Penetration Testing

Learning • Breaking • Securing — Responsibly

Get in Touch Download Resume
Your Name

About Me

I am Tanush Kushwah, a quick learner with strong adaptability to new tools and technologies, driven by a deep interest in offensive security and creative as well as hunger to learn. I approach vulnerability discovery and security testing with a detail-oriented mindset, ensuring accurate identification, analysis, and reporting of security issues.

With strong problem-solving and analytical thinking skills, I am able to break down complex security challenges into practical and effective solutions. As a self-driven and disciplined learner, I continuously work on improving my technical expertise and expanding my knowledge in cybersecurity and I am comfortable working independently as well as collaboratively within a team environment and consider myself an efficient team player.

AREA OF EXPERTISE

Web Application Vulnerability Assessment Penetration Testing Security Analysis OWASP Top 10 Analysis Linux System & Network Basics Identifying Logical & Authentication Flaws Network Security Reverse Engineering

Medium Blogs

My latest articles on cybersecurity and technology

Wireless Penetration Testing with Aircrack-ng

Published: June 2025

Wireless networks are a common target for attackers due to their broadcast nature. This blog post guides you through the penetration testing of WPA/WPA2 Wi-Fi networks using Aircrack-ng — a powerful open-source suite used to assess Wi-Fi network security.

Read on Medium

Oh no! Something has gone wrong Fix in Kali Linux

Published: July 2025

“Oh no! Something has gone wrong. A problem has occurred and the system can’t recover.” This often appears due to a crash in the GNOME desktop environment, missing display drivers, or broken packages.fix it using Rescue Mode from GRUB.

Read on Medium

LDAP Server and Client Setup Guide (Debian 12)

Published: June 2025

LDAP (Lightweight Directory Access Protocol) is an open, vendor-neutral protocol used to access and manage directory information over a network. A directory in this context is a hierarchical database optimized for reading, searching, and managing information about users, groups, systems, and resources.

Read on Medium

Certifications

Certified Ethical Hacker

Armour Infosec Certified Linux Server Administrator (AICLSA)

Issued by: Armour Infosec

Date: June 16, 2025

CompTIA Security+

Armour Infosec Certified Windows Server Administrator (AICWSA)

Issued by: Armour Infosec

Date: December 2, 2024

OSCP

Armour Infosec Certified WordPress Security Expert (AICWSE)

Issued by: Armour Infosec

Date:June 25, 2025

Contact Me

Interested in collaborating or discussing cybersecurity research? Feel free to reach out.