Hi, I'm Sharique Baig

Penetration Tester & Security Consultant

sharique@kali:~
$ nmap -sC -sV target.com
Starting Nmap scan...
PORT    STATE   SERVICE
22/tcp  open    ssh
80/tcp  open    http
443/tcp open    https

$ sqlmap -u "target.com/api/login" --dbs
[!] Injectable parameter found: 'erp'
[+] Database: production_db

$ curl -H "apikey: $ANON_KEY" $SUPABASE_URL/rest/v1/
[!] RLS disabled โ€” Full schema exposed (28 tables)
[+] Exfiltrated: products, orders, users...
SB

Breaking systems to build trust

I'm a cybersecurity professional specializing in penetration testing, vulnerability assessment, and security consulting.

With hands-on experience conducting real-world security assessments for e-commerce platforms and academic systems, I combine technical depth with practical offensive security skills. My approach follows industry-standard methodologies โ€” OWASP WSTG, OWASP Top 10 โ€” and I deliver actionable findings with complete remediation roadmaps.

Beyond security testing, I bring expertise in full-stack development, AI/ML, and embedded systems, giving me a unique perspective on securing applications across the entire technology stack.

3+
Client Engagements
16+
Vulnerabilities Found
1
Bug Bounty
5
Day Workshop Led

Security Services

Comprehensive offensive and defensive security solutions for modern businesses.

๐Ÿ”

Penetration Testing

Simulated real-world attacks on your web applications, APIs, and infrastructure to uncover vulnerabilities before attackers do.

OWASP Top 10 API Testing Auth Bypass Business Logic
๐Ÿ›ก๏ธ

Vulnerability Assessment

Automated and manual scanning to identify security weaknesses across your applications, cloud infrastructure, and source code.

Cloud Security Code Review Infrastructure RLS Audit
๐Ÿ“‹

Security Consulting

Architecture review, remediation guidance, and priority roadmaps to strengthen your security posture and meet compliance goals.

Architecture Review Remediation Plans Training
๐Ÿ’ป

Secure Development

Building applications with security baked in from day one โ€” secure coding practices, DevSecOps, and container hardening.

Secure Code Docker Security RBAC JWT/Auth

Case Studies

Real-world security assessments with sanitized details to protect client confidentiality.

Luxury E-Commerce Marketplace

Full-stack web application penetration test on a luxury product marketplace

Black Box OWASP WSTG v4.2 React + Supabase + Django
5
Findings Total
1
Critical
2
High
2
Medium
Critical

Database Exposure via Misconfigured Row Level Security

Extracted hardcoded API key from client-side JavaScript. Dumped full database schema (28 tables) and exfiltrated product, store, and internal data directly via PostgREST API โ€” bypassing the application entirely. CVSS 9.1.

High

Insecure Direct Object Reference (IDOR)

Order tracking endpoint required no authentication. Sequential order numbers allowed enumeration of all customer orders and sensitive delivery information.

High

Role Escalation via Auth Sync

Authentication synchronization endpoint accepted role parameters from client requests, enabling potential escalation from customer to admin privileges.

Medium

Exposed Admin Endpoints & API Documentation

Django admin panel, Swagger docs, and API schema publicly accessible. robots.txt disclosed 12+ sensitive internal paths.

Medium

Weak Content Security Policy

CSP implemented via meta tag instead of HTTP header. Missing critical directives and unsafe-inline allowing potential XSS exploitation.

University Academic Portal

Gray box penetration test on a student management system handling sensitive academic data

Gray Box Burp Suite Pro Supabase + Express + Netlify
11
Findings Total
5
Critical
2
High
4
Low / Info
Critical

SQL Injection โ€” Authentication Bypass

Login endpoint directly concatenated user input into SQL query. Confirmed via syntax error triggering and comment injection. Enables full authentication bypass and database extraction.

Critical

2FA Bypass โ€” Client-Side Email Manipulation

Two-factor authentication OTP sent to email address from client request body instead of server session. Attacker can redirect OTP to their own email for full account takeover.

Critical

2FA Completely Non-Functional

Session upgraded to "fully authenticated" immediately after first-factor login. Any arbitrary code accepted. Direct URL navigation bypasses 2FA entirely โ€” zero security value.

Critical

Account Takeover via Password Reset

Password reset OTP can be redirected to attacker-controlled email by modifying the request body. Total account takeover of any user.

Critical

Inconsistent SSL/TLS Enforcement

Password reset functionality downgrades to plaintext HTTP. Credentials transmitted in cleartext, enabling network-based interception.

High

Privilege Escalation via Parameter Pollution

Appending ?role=admin to API requests returns admin-level data. URL params override session data, exposing administrative functionality to low-privilege users.

High

Unchanged Passwords Post-Compromise

After a previous security incident, all user passwords remained unchanged for 3+ months. Any stolen credentials from the prior attack remain valid.

Industrial Supplier โ€” Secure E-Commerce Development

End-to-end secure web development and digital strategy for an industrial chemical business

Development Next.js Security-First Architecture
1
Platform Built
โˆž
Auto-SSL
A+
Security Headers
100%
HTTPS Enforced
Delivered

Security-First Architecture Design

Designed the full e-commerce platform with HTTPS enforcement, auto-SSL via Vercel, secure authentication, and input validation from day one.

Delivered

Digital Strategy & Market Analysis

Comprehensive competitor analysis, SEO strategy, and WhatsApp automation integration tailored for the Pakistani market.

Delivered

Maintenance & Operations Guide

Post-launch documentation covering SSL management, DNS optimization, backup procedures, and ongoing security monitoring.

Bug Bounty โ€” SVG File Upload Manipulation

Independent security research on an AI note-taking platform

Bug Bounty File Upload XSS via SVG
1
Vulnerability Found
Med
Severity
โœ“
Fixed by Vendor
Medium

Unsanitized SVG File Upload in Avatar Feature

Discovered that the platform's avatar upload accepted SVG files without sanitizing their contents. SVG files can embed JavaScript and HTML โ€” enabling potential Stored XSS. While the impact was limited in this case (avatars weren't publicly displayed to other users), the lack of server-side validation represented a significant security gap. The vulnerability was subsequently patched by the vendor.

How I Work

A structured, methodology-driven approach to uncovering and remediating security vulnerabilities.

Reconnaissance & Information Gathering

Passive and active recon to map the attack surface โ€” technology fingerprinting, subdomain enumeration, API endpoint discovery, and client-side source code analysis.

Vulnerability Discovery

Combining automated scanning (Burp Suite, ZAP, ffuf) with manual testing against OWASP WSTG and Top 10 to identify security weaknesses across the entire application stack.

Exploitation & Proof of Concept

Safe, controlled exploitation with clear evidence capture โ€” screenshots, HTTP requests/responses, and reproducible steps. No destructive actions.

Business Logic Testing

Application-specific tests targeting payment flows, privilege escalation, authentication bypass, and workflow manipulation that automated tools miss.

Reporting & Remediation

Detailed report with executive summary, technical findings (CVSS scored), step-by-step reproduction, and prioritized remediation recommendations.

Verification & Retest

Post-remediation validation to confirm fixes are effective. Building a long-term partnership for ongoing security assurance.

Skills & Tools

๐Ÿ”ง Offensive Security

Burp Suite Pro OWASP ZAP SQLMap Nmap ffuf Metasploit Wireshark Kali Linux

๐ŸŽฏ Vulnerability Classes

SQL Injection XSS CSRF IDOR SSRF 2FA Bypass Buffer Overflow Privilege Escalation

๐Ÿ’ป Languages & Frameworks

Python JavaScript C/C++ SQL Node.js React Next.js Docker

๐Ÿ“ Standards & Methods

OWASP Top 10 OWASP WSTG CVSS v3.1 Zero Trust MITRE ATT&CK

Certifications

ISC2 โ€” International Information System Security Certification Consortium

Certified in Cybersecurity (CC)

In Progress
  • Foundational knowledge of security principles & operations
  • Incident response, network security, and access control
  • Aligned with industry-standard ISC2 CBK
Google Career Certificates

Google Cybersecurity Professional Certificate

2026 ยท Coursera
  • Hands-on Linux, SQL, Python for security automation
  • SIEM tools, IDS, and packet analysis
  • Vulnerability assessment & incident response
Google Career Certificates

Google Data Analytics Professional Certificate

2025 ยท Coursera
  • Data analysis pipeline: Ask, Prepare, Process, Analyze, Share, Act
  • Visualization with Tableau and R
  • Data-driven decision making

Stories

๐Ÿ›

My First Bug Bounty

SVG File Upload ยท NoteGPT

While exploring NoteGPT โ€” an AI-powered note-taking platform โ€” I decided to test their file upload functionality. When I tried uploading an SVG file as my avatar, I noticed something interesting: the platform accepted it without any sanitization.

SVG files aren't just images โ€” they can contain embedded JavaScript. This means a crafted SVG could execute arbitrary code in users' browsers. While the impact was limited here since avatars weren't publicly visible to other users, the lack of server-side validation was a real security gap.

The vulnerability was eventually fixed. It taught me that sometimes the most interesting vulnerabilities hide in the most mundane features โ€” like a profile picture upload.

๐ŸŽ“

Bridging the Security Gap

STEMX Winter School 2026

At the STEMX Winter School, I designed and delivered a 5-day intensive cybersecurity curriculum for students from grades 8 to 12. I taught them about real-world vulnerabilities โ€” SQL Injection, Cross-Site Scripting, CSRF โ€” through hands-on labs where they could see attacks working in safe, controlled environments.

The most rewarding part? Watching them grow over those 5 days. Students who walked in knowing nothing about security left with the skills to safeguard themselves online. That transformation โ€” from curiosity to capability โ€” is why I believe security education should start early.

"Hacking isn't about breaking rules โ€” it's about thinking critically and understanding how systems work so you can protect them."

Let's Secure Your Business

Have a project that needs a security assessment? Let's discuss how I can help protect your digital assets.