Azhar Basyiri Hartono (English Resume)

Photo of Azhar

Resume (CV)

Versi Bahasa Indonesia: Klik Disini
Nick Name: Azhar
Name: Azhar Basyiri Hartono
Date of Birth: April 19, 1999
Place of Birth: Pemalang, Central Java, Indonesia
Gender: Male
Threema: 3VDCA695
Email:
YouTube: nS.aB Private Family Media
Instagram: Tasyacore Intelligence System
Address: Prima Harapan Regency L 12 NO 35, Bekasi, West Java, Indonesia.

Warm greetings to all, I am a former security researcher as well as a cleaner, waiter and of course I like to be myself, thank you for your attention, I hope you can establish a good working relationship with me and I can work and join your company soon.

Education

Senior High School 2017

Origin Of Institute: SMAN 12 Bekasi
Major: Natural Science

Junior High School 2014

Origin Of Institute: SMPN 38 Bekasi
Major: General

Elementary School 2011

Origin Of Institute: SDN Harapan Baru 5 Bekasi
Major: General

Elementary School 2008

Origin Of Institute: SDN Klapanunggal 04 Bogor
Major: General

Elementary School 2007

Origin Of Institute: SDN 01 Sirangkang Jateng
Major: General

Elementary School 2006

Origin Of Institute: SDN Harapan Baru 3 Bekasi
Major: General

Kindergarten 2005

Origin Of Institute: RA Ibnu Sina Bekasi
Major: General

Nat. Exam Score

Senior High School 2017

Indonesian: 78.0
English: 56.0
Mathematics: 15.0
Biology: 42.5

Junior High School 2014

Indonesian: 7.4
English: 8.0
Mathematics: 4.75
Natural Science: 6.75

Elementary School 2011

Indonesian: 7.6
Mathematics: 7.25
Natural Science: 7.75

Other

Fingerprints Formula 2020

Right: 14 M 7 U OOO 10
Left: O 4 W OOO

STIFIn 2016

Test Result: Intuiting Extrovert

Blood Type 2015

Test Result: A /Rh. +

Skill

Simple Household

Doing basic household chores (Sweeping, Mopping) & Observer of social and political issues independently (Limited Scale)

Computer & Information System

Basic use of operating systems (Linux, Windows, iOS, Android, Symbian, BlackBerry) & Cyber Security Analyst

Experience

Meta Security Researcher, 2025

  • Leakage of chat content information on a previous mobile phone number that has been transferred to another device can be copied with a different number with the same chat content, a different mobile phone number with a different device but the same chat content (can be transferred without user consent to steal WhatsApp message content)

DANA Security Researcher, 2025

  • There has been a leak of personal information identification in Android applications even though they have been reset to factory settings or have been flashed with an Android ROM

Lalamove Motorbike Driver (Courier), 2024-2025

  • Pick up the package at the delivery point and deliver the package to the destination point

Meta Security Researcher, 2024

  • Allegedly that WhatsApp sells data, the test was carried out by transferring the account from WhatsApp Personal to WhatsApp Business and filling in profile information with a Chinese theme such as profile photos and description information available in Chinese language, 1 day later someone offered information about KTA loans (Credit Without Collateral) by Bank CTBC Indonesia who contacted me by telephone to my personal cellphone number which is the same as registered on WhatsApp Business

By.U Indonesia Security Researcher, 2024

  • Found a security loophole that registration data can be changed remotely without knowledge so that the user loses access to their card and a security loophole in the OTP lock feature can be bypassed to waste someone's credit

Maxim Motorbike Driver (Ojek), 2024

  • Pick up passengers at the booking point and drop off passengers at their destination point

Television Stations Paid Audience, 2024

  • Enliven the event that is being broadcast either live or postponed
  • Maintain order in the atmosphere of indoors and outdoors

TelkomselSecurity Researcher, 2024

  • The security of replacement cards, such as upgrading 3G to 4G cards or replacing lost or damaged cards, has weaker security compared to new starter cards and old starter cards sold on the market

TiktokSecurity Researcher, 2024

  • The TikTok application carries out surveillance in the form of hidden location checks when a user reposts without the user's knowledge. If they don't get hidden location access then the user won't find the repost button on the post that will be shared with the user's profile.

MetaSecurity Researcher, 2024

  • Found that WhatsApp on Android devices checks the location before the mobile number is registered and when changing the mobile number so the number cannot be registered outside the country of origin and I managed to log in even though I used a foreign number

IDGOV Security Researcher, 2022

  • Discovered that malicious hackers are leveraging government websites in subdomains and subdirectories to promote online gambling

IOH Security Researcher, 2022

  • Error in the loyalty point calculation system so users with failed transactions still get additional points and the active period on the card can be reversed with the weakness of default bundling package like a new card

Yandex Security Researcher, 2022

  • Found that Yandex made a censorship by blocking several IP addresses so that sending emails on external provider emails to Yandex was hampered and considered as wrong address even though the email address was available and even though it was not the spam category

Apple Security Researcher, 2022

  • Found that Apple does censorship by pre-scan emails before sending emails so that even though the status of the email is sent, it is not in the sent folder of the email sender nor does it reach the email recipient

The Hidden Wiki Volunteer, 2022

  • Follow as a contestant in writing blog articles as well as a contributor (volunteer) with the addition of the .onion link that is not yet available in the social networks category namely Twitter and a suggestion to remove the .onion link from CTemplar as they have been out of operation since May 26 of 2022 based on their official blog post on April 26 of 2022

Bestari Web Host Security Researcher, 2022

  • Finding the use of the identity of the company's website domain is used by irresponsible parties as gambling websites and has been reported to the official website owner and to PANDI (Registry)

Apple Security Researcher, 2022

  • A security hole in the default photo application which can restore a deleted old iCloud photos by adding as many photos as possible from the third party or default file application and send it to the default photo application

Twitter Security Researcher, 2022

  • Successfully made the system unable to reset the password of the account due to an ostensibly false reading so that identity information could not be synchronized with each other

Telegram Security Researcher, 2022

  • Can successfully enter the group even if the admin or moderator has banned

Smartfren Security Researcher, 2022

  • I provide criticism and suggestions on security issues and other important things on the SFShop service to make it more secure and comfortable for all users who use the service

Twitter Security Researcher, 2022

  • Found a security vulnerability that malicious links were inserted by hackers using multiple robotic accounts distributed into videos that would attract users to watch them (Links in the form of videos that can be played like user uploads in general), redirect users automatically to malicious websites that have the potential to harm users, further investigation found that the hacker's domain was from Russia & China and the link managed to trick the virus detection check so it didn't look dangerous, the hacker's technique used skipping the link several times before arriving at the actual malicious website's destination

Bukalapak Security Researcher, 2022

  • The description of the security hole is kept secret (Only for internal parties from Bukalapak ; the vulnerability has been reported through BukaBounty) for user safety
  • Update From Bukalapak: Hi, Thank you for your report. After going through the verification process, we categorize your findings as invalid (Out of scope). Social Engineering is a report that is not included in our bug bounty scope. Therefore, according to the rules of BukaBounty, you are not yet entitled to receive rewards. Thank you for participating in BukaBounty! Regards, NPT [Initial Name] (Cyber Incident Responder)
  • Update From Me (Response): This security vulnerability is the same as in Shopee Indonesia (No Click / Zero Click) without the user having to do anything but this security hole is still kept secret by me for the safety of other users even though it is categorized as Social Engineering by Bukalapak

Tasya ID Media Security Researcher, 2021

  • Bug (25-12-2021): I as the former owner of Tasya ID Media found a zero day attack that can't be fixed, this finding was found by me while visiting the interstitial page of Tasya ID Media which forced downloads, the visit was made with an Apple device and has not been found on an Android device or Computer, Tasya ID Media does not provide download files in any form and does not force users to take download actions, the source code of the website from Tasya ID Media does not provide source code malicious and all source code is publicly available
  • Fixed (28-12-2021): This issue was resolved by a third-party independent researcher; Errors on WebKit when experiencing heavy activity by running a series of activities on the browser by opening tabs a lot or quickly or closing tabs and immediately opening certain static web-based websites will result in triggering downloads accidentally, the solution is to periodically delete cookies and cache and if wanting to turn off JavaScript is recommended for visitors when visiting static websites, this bug is harmless but users should still be careful not to click download if a pop up appears on the first visit because the integrity of the website is questionable whether it is original or compromised by malicious source code from hacker

Facebook Security Researcher, 2021

  • Found that one mobile number can be used on two or more accounts
  • Bypass face verification by using a solid white color photo

Twitter Security Researcher, 2021

  • Found out that there was data theft from accounts run by robots by distributing fake quiz forms with prizes (For doxing targeted user data)
  • Found many unverified accounts (phone numbers and e-mails) to spread mentions or DMs used to track targeted users (Journalist, Activist, Opposition, Politician)

OVO Indonesia Security Researcher, 2021

  • Found an application security vulnerability on Apple devices that can bypass the the user's PIN so that it can enter the application (Physical access to the device is required)

Indonesia Stock Exchange Investor, 2021

  • Learn about stocks and company performance
  • Become a small investor and return big losses

Telkomsel Security Researcher, 2020

  • Found a security hole that the card that has been unregistered can still be used and runs smoothly like a normal registered card

3 Indonesia Security Researcher, 2020

  • Found a loophole that registration data can be changed remotely without the user's knowledge so the real user loses access to the card

Kopega PLN Sektor Priok Industrial Cleaner, 2020

  • Outdoor cleaning (Bunker, Street, Park, Seaside)
  • Indoor cleaning (Office, Control Room)

Cimigo Indonesia Product Research, 2020

  • Assess the feasibility of the product before it is marketed to the public
  • Keep the secret of product that will be issued by the company

Street Tramp, 2020

  • Become a beggar on the street
  • Observing and living the social life of the lower class with love

Tasya ID Media Owner, 2019-2021

  • Learn to manage my own media self-taught
  • Interact with people and international media on a non-profit basis

Television Stations Paid Audience, 2019-2020

  • Enliven the event that is being broadcast either live or postponed
  • Maintain order in the atmosphere of indoors and outdoors

InfinityFree Forum Volunteer Support, 2019

  • Ask and answer about hosting and websites problems to other users
  • Providing users with tips and tricks about hosting and websites

Media Monitoring Club Writer, 2019

  • Learn to write as a content creator
  • Writers who write about any topic of interest

Telkomsel Security Researcher, 2018

  • Finding security holes that other users can carry MITM (Man In The Middle) attacks so that they can carry out unauthorized transactions without the knowledge and confirmation of the real user

IPPO Fried Chicken Sales Officer, 2018

  • Make fried chicken & put it in the display case
  • Take orders & serve customers who want to buy

Secret Recipe Indonesia Restaurant Crew, 2018

  • Baking cakes in a microwave oven
  • Serving customers who want to buy

Asian Games 2018 (Test Event) Volunteer, 2017

  • Providing for the needs of athletes
  • Maintaining the cleanliness of the sports arena
  • Maintain security so that the event runs smoothly

CAFE V Waiter, 2017

  • Setting the table & cleaning dirty tableware
  • Take customer orders & deliver to the cook

Street Scavenger, 2017

  • Looking for a offline job by job fair
  • Picking up trash on the street to resell

FB, IG, Twitter White Hat Hacker, 2017

  • I got into all the old social media belonging to my middle school girl friend by hacking it and I already told her and apologize directly

Ministry of Education & Culture Security Researcher, 2017

  • I found a security loophole that using repeated answers can log all users out on one server and can slow down exam time
  • Exam browser can be minimized in a certain way so that users can cheat in exams without worrying about exiting the system