My profile

Key Competences:

- IT Support, IT Consulting & Management

- Executing and Delivering, Result Oriented, Driving Change

- Digital Marketing

- Customer Service

- Contract Management

- Sales & Influence


Business(SMEs), Day Trading, IT Security, Leading & Helping people achieve their goals.

IT Security courses completed:

* x86 Assembly Language and Shellcoding on Linux

* x86_64 Assembly Language and Shellcoding on Linux

* GNU - Debugger Megaprimer

* Exploiting Simple Buffer Overflows on Win32

* Python for pentesters

* Web Application Pentesting

* Javascript for Pentesters

All my certificates from Lynda.com:


I'd like to explore new opportunities within IT Security.

If you like to explore further what I'm up to, then follow me on my Twitter page: @Maxjensendk

I am a firm believer in that, no assignment is too big.

Mobile phone: +45 23 96 67 13

Mail: Max@maxjensen.dk

★★★ Alternatives ★★★

✔ Blog: http://www.maxjensens.blogspot.dk

✔ Twitter: http://twitter.com/maxjensendk

✔ Linkedin: http://www.linkedin.com/pub/max-jensen/49/b02/a55


Think of when performing in a new environment:

Don’t be malicious.

Don’t be stupid.

Don’t attack targets without written permission.

Consider the consequences of your actions.

If you do things illegally, you can be caught and put in jail! (Considering in Denmark, Straffeloven  § 263 stk. 2)

Stanford university - Cryptography

Some of my favorite moments

Analysing 3rd party shellcode with Libemu
Exploiting Memcpy() within a simple TCP echo server on WinXP SP3:
- Meterpreter shell style
Using Railgun within Meterpreter to invoke a syscall that locks the client workstation
Exploitation from AoE - Web Server:
I was calculating about how large my NOP sled should be and allign the 78-byte shellcode, since the buffer was 500 bytes I knew that I had a chance to get control over the program execution - and thereby exploited the web server!
How System Calls work:
I learn stuff by drawing them down on my whiteboard.
Exploitation of FreeSSHd - example
Adding debugging content to exsisting programs and Stripping it afterwards


About -  Max Jensen