itskilltroll
- 6nodes
- 8years
Ali Omar Alaskari
Founder, Chief Creative Visionary & Developer of Solnyshko Jewellery.
Penetration Tester || Operations Coordinator , OSCP / CEH / NSE / Web3 / N8N Workflow
BurpSuite
Auditing web application security by intercepting and analyzing live traffic.
Metasploit
Executing modular exploits and managing payloads for full-scale penetration tests.
Wireshark
Analyzing network protocols and diagnosing infrastructure traffic bottlenecks.
Wireless Security
Assessing Wi-Fi resilience using Aircrack-ng, Airegeddon, and Hashcat.
Hashcat
Testing cryptographic hash strength and password security policies.
Full-Stack Dev
Architecting secure web applications with modern frontend frameworks.
PRODUCTION_INFRASTRUCTURE_MONITOR
Topological map tracking interactive real-world pipeline assets initialized. Select any environment module or active storage layer instance to verify routing paths, protection systems, and deployment loops.
Founder & Chief Creative Visionary & Developer
With an exceptional eye for classical luxury and modern form, AliOmar leads the artistic direction, turning avant-garde concepts into iconic, production-ready jewelry architectures.
SoloMedic Platform Development
- Platform Architecture: Designed the digital foundation for SoloMedic, focusing on a premium UI and healthcare-centered logic.
- Financial Integration: Implemented secure payment systems for local Iraqi banking (FIB, Super Qi) and international USDT/Crypto.
- Automation & AI: Leveraged n8n and Gemini API to streamline platform workflows and content generation.
- Asset Security: Configured Cloudflare WAF rules to protect proprietary platform data and prevent unauthorized access.
- Sponsorship Framework: Engineered a scalable tiered system to facilitate and manage diverse healthcare funding opportunities.
IT Engineer — Support & Administration
Network Infrastructure & Hardware Deployment
- Infrastructure Design: Expert in network rack integration, including structured cabling, professional wiring, and ongoing hardware maintenance.
- Hardware Implementation: Proficient in the installation and configuration of network-attached resources, including NVRs, NAS systems, and IP-based peripherals.
- Telecommunications: Experience in the deployment and configuration of Panasonic PBX systems.
Systems Administration & Identity Management
- Directory Services: Advanced management of Azure Active Directory and on-premises Windows Domain environments, including user/computer object administration and Group Policy enforcement.
- Endpoint Management: Managed centralized update deployment via WSUS to ensure enterprise-wide security compliance.
- Multi-Factor Authentication: Implementation of FortiAuthenticator tokens to secure domain access.
Network Services & Storage Solutions
- DNS Management: Configuration and optimization of Domain Name Servers and DNS zones using Bind9 and Unbound.
- Storage & Redundancy: Comprehensive administration of QNAP NAS devices, including data redundancy (RAID), backup scheduling, and user access restrictions.
- System Monitoring: Proactive oversight of network health, monitoring servers, desktops, and storage devices to ensure maximum uptime.
Technical Support & Troubleshooting
- L2/L3 Support: Providing high-level technical assistance by identifying, investigating, and resolving complex hardware and software bottlenecks.
Offensive Security & Ethical Hacking
- Adversarial Simulation & Web Exploitation: Conducted comprehensive penetration testing across various Operating Systems (Windows/Linux) and web applications; identified and exploited high-severity vulnerabilities including Local File Inclusion (LFI), Directory Traversal, and Open Redirect flaws.
- AV Evasion & Payload Development: Developed custom obfuscation and encryption techniques to evaluate the effectiveness of Anti-Virus (AV) and Endpoint Detection and Response (EDR) solutions.
- Active Directory Exploitation: Executed advanced post-exploitation techniques, including Privilege Escalation, Lateral Movement, and Kerberoasting, to assess AD forest security.
- Exploitation Frameworks: Proficient in executing Remote Code Execution (RCE) and shell management within controlled testing environments.
Network & Wireless Security
- Traffic Analysis & Man-in-the-Middle (MITM): Performed deep-packet inspection, packet sniffing, and network spoofing (ARP/IP); utilized SSL Stripping to evaluate the integrity of encrypted communication channels.
- Wireless Security Auditing: Assessed wireless infrastructure resilience by simulating Evil Twin attacks, captive portal phishing, and Denial of Service (DoS) scenarios.
- RF & Cellular Security: Utilized SDR (Software Defined Radio) tools like HackRF for IMSI analysis and signals intelligence research.
Defensive Security & Infrastructure
- Threat Intelligence & Deception: Deployed and managed Honeypots to track adversary tactics, techniques, and procedures (TTPs) for proactive threat mitigation.
- Zero Trust Architecture: Orchestrated secure remote access and identity-verified networking using Twingate (ZTNA).
- Load Balancing & High Availability: Managed enterprise-grade traffic distribution and application delivery via Kemp Load Balancers.
Bachelor of Engineering
Specialization: Computer Networking Specialist. Mosul, Iraq.