About me

Curious by nature and thirsty for knowledge, I'm passionate about many subjects. My attention has been drawn to many subjects including algorithms, mathematics, education, computer science and above all: cybersecurity. For almost 7 years now, I've been trying to learn more and more about the way our information systems are organized. Breaking down each layer one by one to understand its essentials and be able to manipulate its workings. This obviously led me to delve into offensive security, since its essence resides right here: hijacking the way things work.

I'm currently working on a freelance basis with various customers to ensure the security of their information systems and develop their arsenal of automated tools. My services range from penetration testing to test the security of IT systems, to the development of automation tools, audit modules and scripts of all kinds.

In addition to the missions I'm given, I'm constantly learning about the new attack techniques emerging and the new technologies in use around the world, as these are the focus of tomorrow's attacks.

What i'm doing

  • Web icon

    Application development / scripting

    Development of optimization and automation software. Projects vary according to demand: automatic document generation, scripting, auditing software or modules, vulnerability exploitation scripts. I master many programming languages: Python, C, C++, Java, bash, web...

  • Hacker icon

    Internal system penetration testing

    Since it's an internal system, there's no need for protection... oh wait? This is surely one of the most interesting parts of the penetration test, as the attack vectors are diverse and surprising.

  • We bapp icon

    Web application penetration testing

    Breaking into web applications is one of my favorite hobbies, an activity I would recommend to anyone lacking dopamine. On a more serious note, this is surely the most important part of a penetration test, as web services are often exposed to the public and thus become entry points for attackers.

  • book icon

    Education

    There's something pure and beautiful about teaching. We're where we are because others have been willing to share their knowledge, so it seems healthy and natural to do the same for others who haven't been given the chance. Teaching mathematics and sharing knowledge about offensive security remain key activities of mine.

Mission proposals

Security Audit Report You can contact me directly on this email baptiste.coste@proton.me .
I can also be joined on two freelance applications : malt and upwork.

If you wish to see some examples of my work, I encourage you to check this Security Audit Report. It contains the final report of a Vulenrability Assessment on a REST API in production. It is, for obvious reasons, anonymized.

If you have a project on training or formation related to the Cybersecurity field, do not hesitate to contact me, I am really open to this kind of proposal.

Resume

Education

  1. OSCP Certification

    November 2023 - February 2024

  2. Agrégation in Mathematics

    2020‐2021

    Option probability and statistics. Rank obtained : 161 out of 335. Preparation at the university of Poitiers.

  3. Engineering degree in Cybersecurity

    2017‐2020

    ENSTA Paris, Polytechnic Institute. Paris, Specializing in Information Systems Architecture and Security.

Experience

  1. Cybersecurity Expert

    2022 ‐ Now

    Developing application or script for clients
    Testing web application for associations and companies (startups, associations, local companies).
    Testing system security (privilege elevation, information disclosure) on Windows and UNIX systems.
    Testing corporate networks (exploiting exposed services to compromise several network machines).
    Writing reports including all the vulnerabilities found, their criticity, a way to reproduce them, advices to fix them.

  2. High school teacher

    September 2021 ‐ August 2022

    Teaching Mathematics and Computer Science.
    Vulgarization and discussion of topics closely related to cybersecurity (phishing, cryptography, password creation methodology, malware).

  3. Development of a communication interface for HSMs

    2010 — 2013

    Development of multi‐platform command‐line software for administering and performing cryptographic operations on an HSM (Hardware Security Module).
    Development of the software in C for UNIX and Windows environments, and writing of the associated documentation.

  4. Research project on IOT Security

    May‐August 2019

    Development of a self‐balancing robot immune to side‐channel attacks.
    Development of C code, program architecture and security protocols implemented.

My skills

  • Application development
  • Web Application Penetration Testing
  • System Penetration Testing
  • Active Directory Penetration Testing
  • Cryptography
  • Communication and Vulgarization
  • Mathematics

Blog

Contact

Contact Form