Bio

I am a Graduate student pusruing my Masters in cybersecurity at University of Maryland At the University of Petroleum and Energy Studies, I earned my Bachelor of Science in Computer Science with a Specialization in Cyber Security and Forensics My main interests are Network Security and application security.

I worked as a cybersecurity intern at 3i-infotech LTD for seven months. During my internship, I collaborated with the cloud, SOC, and network teams, among others. While indulging in the internship Identified intrusion and malicious events on FortiSIEM by performing (50+) Real-time Monitoring, Investigation, Analysis, Reporting, and Escalation of Security Events from Multiple Log Sources. Also Collaborated on the SASE-based cloud solution Nure Edge and and offered assistance with customer implementation Additionally,by collaborating with the network team, I learned about firewalls and network architecture

Previously, I was employed by PAC Security LLP as an intern for web application security. I learned about Real-time Web Applications and Network Vulnerabilities while participating in the internship. I also gained practical Bug Bounty experience on actual targets during that time and successfully located two valid bugs on the Endurance International Group's web application.

Recently I have worked on a Major Project of CryptWare: Attack Simulator and Detector where created an auto executable crypto-mining malware and then set up a minimal yet sterling detector that shall help in being safe from illegitimate activities on the system. Previously I have also worked on a Minor project of Network Traffic Analysis where we perform a passive sniffing and detect the Network anomaly using python. I have worked on few more projects to explore my field of interest ,that includes Steganography using LSB, SSH Botnet, Port Scanner, Unix Password Cracker.

I am constantly increasing my theoretical and practical knowledge by solving the Virtual Labs available online on the platform such as Try Hack me, Hack The Box, Portswigger Labs. Also I play CTF's occasionally and am learnig new things everyday in the cybersecurity domain.

Projects

Web_Con

The Web_con Tool is a versatile utility for investigating web applications. It offers IP address and domain name discovery, port scanning, web server analysis, source code data extraction (email addresses, links, images), and Google search integration. What sets it apart is its robust anonymity features, including dynamic User-Agent strings, proxy server support, and automatic cookie clearance, ensuring discreet reconnaissance.


Network Packet Analyzer

The project aims to create a network packet analyser tool, capable of automating various analytical steps during DFIR phase of a Cyber Incident. This tool has been created keeping 2 objective in mind: To parse logged network packets and automate the passive analysis of the traffic to an extent. Differentiate basic traffic from reconnaissance traffic containing exploits, or malicious intent.
Supervising Faculty - Ms. Tripti Misra


Consulting in Cloud Security

Utilized AWS to architect an on-premises to cloud migration plan for a small to mid-level organization, incorporating cloud security and compliance best practices.


Steganography and Steganalysis of an Image

This is Project build in C Language where we hide a Text file using LSB algorithm in an Image and also Detect any Hidden Text file available
Supervising Faculty - Dr.Akashdeep Bhardwaj


SSH Botnet

This is a self build project in python using pexpect, pxssh and argparse library which could connect remotely to multiple SSH .


Unix Password Cracker

This is a self build project in python using crypt library that could crack password of a Unix File system by using password hash

Blog/Writeups

In my free time, I enjoy writing Computer Science and Cybersecurity related articles.

Coming soon

Volunteer Adventures

  • Bsides NoVa
  • JwanCon

Elements

Text

This is bold and this is strong. This is italic and this is emphasized. This is superscript text and this is subscript text. This is underlined and this is code: for (;;) { ... }. Finally, this is a link.


Heading Level 2

Heading Level 3

Heading Level 4

Heading Level 5
Heading Level 6

Blockquote

Fringilla nisl. Donec accumsan interdum nisi, quis tincidunt felis sagittis eget tempus euismod. Vestibulum ante ipsum primis in faucibus vestibulum. Blandit adipiscing eu felis iaculis volutpat ac adipiscing accumsan faucibus. Vestibulum ante ipsum primis in faucibus lorem ipsum dolor sit amet nullam adipiscing eu felis.

Preformatted

i = 0;

while (!deck.isInOrder()) {
    print 'Iteration ' + i;
    deck.shuffle();
    i++;
}

print 'It took ' + i + ' iterations to sort the deck.';

Lists

Unordered

  • Dolor pulvinar etiam.
  • Sagittis adipiscing.
  • Felis enim feugiat.

Alternate

  • Dolor pulvinar etiam.
  • Sagittis adipiscing.
  • Felis enim feugiat.

Ordered

  1. Dolor pulvinar etiam.
  2. Etiam vel felis viverra.
  3. Felis enim feugiat.
  4. Dolor pulvinar etiam.
  5. Etiam vel felis lorem.
  6. Felis enim et feugiat.

Icons

Actions

Table

Default

Name Description Price
Item One Ante turpis integer aliquet porttitor. 29.99
Item Two Vis ac commodo adipiscing arcu aliquet. 19.99
Item Three Morbi faucibus arcu accumsan lorem. 29.99
Item Four Vitae integer tempus condimentum. 19.99
Item Five Ante turpis integer aliquet porttitor. 29.99
100.00

Alternate

Name Description Price
Item One Ante turpis integer aliquet porttitor. 29.99
Item Two Vis ac commodo adipiscing arcu aliquet. 19.99
Item Three Morbi faucibus arcu accumsan lorem. 29.99
Item Four Vitae integer tempus condimentum. 19.99
Item Five Ante turpis integer aliquet porttitor. 29.99
100.00

Buttons

  • Disabled
  • Disabled

Form