Perfil de seguridad

NORMAN
IASICH

role::

From curiosity to cybersecurity.
Pentesting · Networking · Sistemas Linux.

© 2025 Norman Iasich

About Me

Who's behind the terminal?

$ nmap -sV targetHost: up (0.021s)22/tcp open ssh80/tcp open httpN

I'm Norman Iasich, a Cybersecurity student at Teclab (Argentina), currently pursuing my Tecnicatura in Cybersecurity. My passion for digital security started from pure curiosity — how systems work, how they break, and how to protect them.

Beyond formal education, I continuously expand my skills through Platzi and TryHackMe, tackling CTF challenges, structured learning paths, and hands-on labs focused on penetration testing and ethical hacking.

5+
CTF Machines Solved
3
Learning Platforms
1
Degree in Progress

Skills

My technical toolkit

Offensive Security

Penetration Testing
Ethical Hacking
Vulnerability Analysis

Tools

Kali Linux
Nmap
Burp Suite
Metasploit
Wireshark

Fundamentals

Linux
Networking
Web Security

Journey

My path in cybersecurity

2026education

Started Cybersecurity Degree

Began Tecnicatura en Ciberseguridad at Teclab, Argentina

2026certification

Platzi: Intro to Cybersecurity

Completed introductory cybersecurity course on Platzi

2026certification

Platzi: Networking Course

Completed networking fundamentals course

2026certification

TryHackMe: Pre-Security Path

Completed Pre-Security learning path on TryHackMe

2026ctf

First CTF Completed

Successfully rooted first TryHackMe machine (Blue Room)

2026milestone

TryHackMe: Jr Penetration Tester

Currently pursuing Jr Penetration Tester path

CyberLab

Security projects, labs & CTF write-ups

OSINT

Recon Tool

Herramienta de reconocimiento pasivo que automatiza la recolección de subdominios, emails y metadatos usando fuentes públicas.

PythonReconOSINT
View Documentation
LAB

HTB Linux PrivEsc

Metodología documentada de escalada de privilegios en entornos Linux usando técnicas de SUID, cron jobs y misconfigurations.

LinuxPrivilege EscalationHTB
View Methodology
CTF

PicoCTF 2024

Writeup de los challenges resueltos en PicoCTF 2024, con enfoque en web exploitation y criptografía clásica.

Difficulty: Medium

WebCryptoForensics
View Write-up

CTF Writeups

Detailed walkthroughs of security challenges

MediumTryHackMe

Mr. Robot Room

Compromised a Linux machine inspired by the Mr. Robot series.

WordPressPrivilege EscalationSUIDCTF
EasyTryHackMe

Blue Room - EternalBlue

Exploited the MS17-010 EternalBlue vulnerability on Windows 7.

EternalBlueMS17-010MetasploitMimikatz
EasyPersonal Lab

DVWA Vulnerability Lab

Practiced common web vulnerabilities on DVWA.

SQL InjectionXSSCSRFBurp Suite
MediumPersonal Lab

Automated Network Scanner

Python script combining Nmap with custom HTML reporting.

PythonNmapAutomationScripting

Education & Certifications

My learning journey

TeclabIn Progress

Tecnicatura en Ciberseguridad

2026 – Present

TryHackMeCompleted

Pre-Security Path

2026

TryHackMeIn Progress

Jr Penetration Tester Path

2026 – Present

PlatziCompleted

Introduction to Cybersecurity

2026

PlatziCompleted

Networking Course

2026

Get In Touch

Let's connect and talk security

Whether you want to collaborate on a CTF, discuss cybersecurity, or just say hello — my inbox is always open.