Profile image of bhargav1990
Flag of India Valsad, India
Member since September, 2012
0 Recommendations

Bhargav Tandel 

Website:- (1) Ethical Hacking & Penetration Testing. (2) Server Security. (3) Network Security. (4)Web Security. (5)Redhat Server installation and Management. (6)Ubuntu, Backtrack, Kali, RedHat, CentOS, Debian. (7)Cisco switchs and Router Configuration.
$20 USD/hr
0 Reviews
  • N/AJobs Completed
  • N/AOn Budget
  • N/AOn Time
  • N/ARepeat Hire Rate

Recent Reviews

No reviews.


Engineer - Network Management

May 2012

-Network Management -CCNA -Linux server -Ethical Hacking -Penetration Testing - Network Security -Information Security

Network Engineer

Jan 2012 - May 2012 (4 months)


B.E (I.T)

2007 - 2011 (4 years)


2007 - 2011 (4 years)


Degree Certificate (2011)

Saurashtra University

This Certificate i got for Completing my Information Technology Degree at Saurashtra University.

CCNA (2013)

mind Leaders

certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks. CCNA certified professionals have the knowledge and skills to make connections to remote sites via a WAN, and mitigate basic security threats.

Wi-Fi Penetesting Kali Linux (W1) (2014)

Pentest Magazine

It's about Wi-Fi Security Testing. during that course i have learned different tools & Techniques for test Wi-Fi security Test.

Metasploit Framework Workshop (W5) (2014)

Pentest Magazine

Metasploit is computer security testing Framework. i have learned different payloads & Exploiting Target using different-different scenario.


Youtube Channel

Smartphone PenTest Framework (SPF) Up and Running in Kali Linux

Smartphone Pentest Framework is a tool for penetration testing the android Smartphone. It’s also may use Iphone and Blackberry developenment. The Smartphone-Pentest-Framework is a tool developed by Georgia Weidman. It is designed to aid in assessing the security posture of Android Smartphone’s in an outer environment.

Nmap – Gathering Additional Host Information

The most important process during a penetration test is the information gathering phase. During this process we investigate our target with the goal of learning everything about it. The information we discover could be invaluable in further stages of our penetration test. During this process we gather information such as usernames, possible passwords, additional hosts and services, or even version banners, among many other interesting bits of data.

Nmap – Auditing Web Servers

Hypertext Transfer Protocol (HTTP) is arguably one of the most popular protocols used today. Web servers have moved from serving static pages to handling complex web applications with actual user interaction. This has opened the doors to tainted user input that could change an application’s logic to perform unintended actions. Modern web development frameworks allow almost anyone with knowledge of programming to produce web applications within minutes, but this has also caused an increase of vulnerable app