Kunal Patel

Kunal Patel Email and Phone Number

Lab Engineering Manager @ Hack The Box | OSCP | CPTS | CNSS | AWS:SAA | AZ-104 | AZ-900 @ Hack The Box
folkestone, kent, united kingdom
Kunal Patel's Location
Ahmedabad, Gujarat, India, India
About Kunal Patel

Infosec guy | Ansible master

Kunal Patel's Current Company Details
Hack The Box

Hack The Box

View
Lab Engineering Manager @ Hack The Box | OSCP | CPTS | CNSS | AWS:SAA | AZ-104 | AZ-900
folkestone, kent, united kingdom
Website:
hackthebox.eu
Employees:
406
Kunal Patel Work Experience Details
  • Hack The Box
    Training Lab Engineering Manager
    Hack The Box Jan 2024 - Present
    Folkestone, England, United Kingdom
  • Hack The Box
    Senior Training Lab Engineer
    Hack The Box Jan 2023 - Jan 2024
    Folkestone, England, United Kingdom
  • Hack The Box
    Training Lab Engineer
    Hack The Box Jan 2022 - Jan 2023
    Folkestone, England, United Kingdom
    • Designed & Developed multiple versions of EXAM labs for HTB CPTS (HackTheBox Certified Penetration Testing Specialist) Certification.• Designed & Developed a scalable Ansible structure from scratch that can fully automate & streamline the building process of HTB Academy module Labs/Vms. [VM Provisioning (Creating/Cloning) -> Configuring -> Final Hygiene (Production)].• Automated building multiple versions of CPTS Exam labs & Academy Module labs by stitching multiple stuff together (Ansible, Powershell, Python, Bash, Docker, Flask, Php...)• Made reusable dynamic Ansible Roles to completely automate Active Directory Configuration (Advanced AD Attack vectors) with Ansible & Powershell.• Helped Develop & Automate Labs for some of the HackTheBox Academy Modules: - Active Directory Enumeration & Attacks - Attacking Enterprise Networks - Vulnerability Assessment - Using the Metasploit Framework - Pivoting, Tunneling, and Port Forwarding - Kerberos Attacks - Using CrackMapExec - Discretionary Access Control Lists Abuse
  • Kpmg India
    Security Analyst
    Kpmg India Aug 2021 - Jan 2022
    Bengaluru, Karnataka, India
    • Conducted Red Team Assessments, successfully compromising domain and enterprise admin on one of the engagements• Conducted security assessments on Operational Technology (OT) controller devices, including RTUs, Relays, and PLCs, to identify vulnerabilities and ensure the resilience of industrial systems. Collaborated with clients to implement cybersecurity best practices in OT environments, enhancing access control and network segmentation. Performed resilience testing and delivered detailed reports to help clients make informed decisions about securing critical infrastructure.• Conducted in-depth security assessments of web applications, encompassing a wide range of attack vectors, using OWASP Web Application Security Testing Checklist and finding security misconfigurations. Leveraged both automated tools and manual testing techniques to uncover vulnerabilities, aiding clients in safeguarding their online assets.• Assessed the security of APIs used for data exchange and integration. Evaluated authentication, authorization, and data integrity to identify potential security weaknesses and recommend mitigation strategies. This work helped clients secure their data-sharing interfaces and maintain the integrity of their API-driven systems.• Automated Red Team infrastructure configuration using Bash and Python scripts, streamlining operations.• Successfully set up Command and Control (C2) infrastructure for macOS (Mythic) and developed persistent MacOS payloads.• Configured a robust phishing infrastructure on AWS, utilizing EC2, Route53, Cloudfront, and S3 services for security testing and assessments.
  • Offensive Security
    Ugc Author
    Offensive Security Oct 2020 - Jul 2021
    • Designed and chained Vulnerable UNIX machines with concealed vectors simulating real-world penetration testing scenarios, to help build up aspiring penetration testers' skills. • Created challenging virtual machines out of discovered vectors by adding an engaging storyline to accompany the created virtual machine
  • Seclance
    Security Researcher
    Seclance Dec 2020 - Jun 2021
    Bangalore Urban, Karnataka, India
    • Worked with Departments and managers to analyze technical resource effectiveness.• Conducted Penetration Testing for Web applications.• Worked to perform Vulnerability Assessment and Penetration Testing.• Did Research related to the Cyber Security domain. (Finding Concealed Vectors)• Gave training to the Internal team on using Azure and Administering Azure Infrastructure• Performed Documentation & created POC for techniques from MITRE ATT&CK• Performed Installation & Configuration of Gophis & C2 server on cloud (Vultr/AWS)• Performed OSINT & Phishing for red team assessments

Kunal Patel Education Details

Frequently Asked Questions about Kunal Patel

What company does Kunal Patel work for?

Kunal Patel works for Hack The Box

What is Kunal Patel's role at the current company?

Kunal Patel's current role is Lab Engineering Manager @ Hack The Box | OSCP | CPTS | CNSS | AWS:SAA | AZ-104 | AZ-900.

What schools did Kunal Patel attend?

Kunal Patel attended Gujarat Technological University (Gtu).

Who are Kunal Patel's colleagues?

Kunal Patel's colleagues are Mohammed Taha Ghandi, Nick Bantaliants, Adam S, Alex Stephan, Jason Dunn, Sazumi Viki, Isuru Umayanga.

Not the Kunal Patel you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.