Michele Toccagni

Security Associate Manager @ Accenture

A Penetration Tester with 4+ years of experience in penetration testing on various applications in different domains. Ability to read and analyze code, from Java to .NET. Have hands-on experience in security research along with different security testing tools.

1993 BIRTH
ITALY NATIONALITY
ITALIAN (NATIVE), ENGLISH (INTERMEDIATE) LANGUAGE

Work Experiences

March 2018 - current

Security Specialist - Penetration Tester

Accenture Italy


  1. Involved in the security analysis of infrastructures, with focus on Web, Network, Mobile and Thick Client Penetration Test.
  2. Developed a tool to generate automatically the reports of Penetration Tests (like Serpico). This tool is written in Python-Flask, create both Word and Excel reports and it's used by the whole team.
  3. Team management, both in managing activities and in relations with clients.
  4. Coordinate and direct all phases of product testing while managing and leading project teams.
  5. OSINT and Threat Intelligence activities.
December 2017 - December 2017

Security Audit

Argo Software

November 2016 - January 2017

Collaboration with Alpha Institute of Geopolitics and Intelligence

Malware Analisys for the Ransomware Report 2016

Penetration Test Skills

WEB

  • Deep knowledge of OWASP Top 10.
  • Knowledge of Advanced Attacks, like Bypass CSRF, Blind XXE and so on.
  • Daily usage of tools like Burp Suite, OWASP ZAP, SQLmap, nikto, etc.
  • Ability to perform a deep analysis on decompiled web app source code.
  • Ability to exploit vulnerabilities by chaining them into complex attacks.

Mobile

  • Deep knowledge of OWASP Top 10 Mobile.
  • Static and Dynamic Analysis on Android and iOS applications.
  • Usage of tools like Jadx, Objection, Frida, etc.
  • Ability to read Java in order to craft custom exploit.

Network

  • Using information gathering techniques to identify and enumerate targets running various operating systems and services.
  • Conducting remote, local privilege escalation, and client-side attacks.
  • Leveraging tunneling techniques to pivot between networks.
  • Knowledge of bash scripting and python in order to create custom exploit.

Thick Client

  • Ability to enumerate services on Windows Platform.
  • Knowledge of Decompilation tool like Dnspy, DotPeek, etc.
  • Ability to perform a deep analysis on decompiled windows app source code.
  • Ability to exploit vulnerabilities by chaining them into complex attacks.
  • Proficiency in scripting, Unix operating systems and windows

Soft Skills

  • Ability to communicate technical vulnerabilities to developers and C-Level.
  • Managed the activities from the planning to the delivery.
  • Worked with application developers to validate, assess, understand root cause and mitigate vulnerabilities.

Education

2018 - 2021

Laurea Magistrale (Master), Cyber Security

University of Milan

Milan, Italy

2013 - 2018

Laurea Triennale (Bachelor), Comunicazione Digitale

University of Milan

Milan, Italy

2007 - 2013

Liceo Scientifico Tecnologico

I.S.I.S G. Natta

Bergamo, Italy

Mentions

Blog post for Alpha Institute

Prevenzione e contromisure per CTB-Locker

Primo passo della caccia al bug con hacking etico

A blog post about the research that I've done on the websites of the cities of Italy

PacketStorm Security

CVE-2020-13872

Awards

OSCP Certified

Obtained in June 2019

Telecom Italia - Hall of Fame

I've found an SQL Injection on a site managed by Telecom Italia

Fastweb - Hall of Fame

I've found vulnerabilities on some sites managed by Fastweb

CVE-2020-13872

I identified a vulnerability in the Royal TS software that allows to bypass authentication

CERT-EU - Hall of Fame

I've found a vulnerability on a site managed by Europe.eu

Contact

Email
contact [at] toccagni {dot} info