Michele Toccagni

Security Delivery Specialist @ Accenture

Penetration Tester, active learner, interested in everything related to computer security.

1993 BIRTH
ITALY NATIONALITY
ITALIAN (NATIVE), ENGLISH (INTERMEDIATE) LANGUAGE

Work Experiences

March 2018 - current

Security Specialist - Penetration Tester

Accenture Italy


  1. Involved in the security analysis of infrastructures, with focus on Web Penetration Test, Network Penetration Test and Mobile Penetration Test.
  2. I have developed a tool to generate automatically the reports of Penetration Tests (like Serpico). This tool is written in Python (Flask) and create both Word and Excel reports and it's used by the whole team.
  3. Team management, both in managing activities and in relations with clients.
  4. OSINT and Threat Intelligence activities.
December 2017 - December 2017

Security Audit

Argo Software

November 2016 - January 2017

Collaboration with Alpha Institute of Geopolitics and Intelligence

Malware Analisys for the Ransomware Report 2016

Skills

CODING SKILLS

Java
Python
C
R

SECURITY

OSINT
Penetration Testing
Web application testing
Mobile Penetration Test
Cyber Threat Intelligence

Tools

Burp Suite - OWASP ZAP
Nessus - SonarQube - Yasca
Sqlmap - Fimap - Commix
Nikto & Kali's tools suite

Education

2018 - 2021

Laurea Magistrale (Master), Cyber Security

University of Milan

Milan, Italy

2013 - 2018

Laurea Triennale (Bachelor), Comunicazione Digitale

University of Milan

Milan, Italy

2007 - 2013

Liceo Scientifico Tecnologico

I.S.I.S G. Natta

Bergamo, Italy

Mentions

Blog post for Alpha Institute

Prevenzione e contromisure per CTB-Locker

Primo passo della caccia al bug con hacking etico

A blog post about the research that I've done on the websites of the cities of Italy

PacketStorm Security

CVE-2020-13872

Awards

OSCP Certified

Obtained in June 2019

Telecom Italia - Hall of Fame

I've found an SQL Injection on a site managed by Telecom Italia

Fastweb - Hall of Fame

I've found vulnerabilities on some sites managed by Fastweb

CVE-2020-13872

I identified a vulnerability in the Royal TS software that allows to bypass authentication

CERT-EU - Hall of Fame

I've found a vulnerability on a site managed by Europe.eu

Contact

Email
contact [at] toccagni {dot} info