Bio
I am a Graduate student pusruing my Masters in cybersecurity at University of Maryland
At the University of Petroleum and Energy Studies, I earned my Bachelor of Science in Computer Science with a Specialization in Cyber Security and Forensics
My main interests are Network Security and application security.
I worked as a cybersecurity intern at 3i-infotech LTD for seven months.
During my internship, I collaborated with the cloud, SOC, and network teams, among others.
While indulging in the internship Identified intrusion and malicious events on FortiSIEM by performing (50+) Real-time Monitoring,
Investigation, Analysis, Reporting, and Escalation of Security Events from Multiple Log Sources. Also Collaborated on the SASE-based cloud solution
Nure Edge and and offered assistance with customer implementation Additionally,by
collaborating with the network team, I learned about firewalls and network architecture
Previously, I was employed by PAC Security LLP as an intern for web application security.
I learned about Real-time Web Applications and Network Vulnerabilities while participating in the internship.
I also gained practical Bug Bounty experience on actual targets during that time and successfully located two valid bugs on the Endurance International Group's web application.
Recently I have worked on a Major Project of CryptWare: Attack Simulator and Detector where created an auto executable
crypto-mining malware and then set up a minimal yet sterling detector that shall
help in being safe from illegitimate activities on the system.
Previously I have also worked on a Minor project of Network Traffic Analysis where we
perform a passive sniffing and detect the Network anomaly using python. I have worked on few
more projects to explore my field of interest ,that includes Steganography using
LSB, SSH Botnet, Port Scanner, Unix Password Cracker.
I am constantly increasing my theoretical and practical knowledge
by solving the Virtual Labs available online on the platform such as Try
Hack me, Hack The Box, Portswigger Labs. Also I play CTF's occasionally and am learnig new things everyday in the cybersecurity domain.
Projects
The Web_con Tool is a versatile utility for investigating web applications. It offers IP address and domain name discovery, port scanning, web server analysis,
source code data extraction (email addresses, links, images), and Google search integration. What sets it apart is its robust anonymity features, including
dynamic User-Agent strings, proxy server support, and automatic cookie clearance, ensuring discreet reconnaissance.
The project aims to create a network packet analyser tool, capable of automating various analytical steps during DFIR phase of a Cyber Incident.
This tool has been created keeping 2 objective in mind:
To parse logged network packets and automate the passive analysis of the traffic to an extent.
Differentiate basic traffic from reconnaissance traffic containing exploits, or malicious intent.
Supervising Faculty - Ms. Tripti Misra
Utilized AWS to architect an on-premises to cloud migration plan for a small to mid-level organization, incorporating cloud
security and compliance best practices.
This is Project build in C Language where we hide a Text file using LSB algorithm in an Image and also Detect any Hidden Text file available
Supervising Faculty - Dr.Akashdeep Bhardwaj
This is a self build project in python using pexpect, pxssh and argparse library which could connect remotely to
multiple SSH .
This is a self build project in python using crypt library that could crack password of a Unix File system by using password hash
Blog/Writeups
In my free time, I enjoy writing Computer Science and Cybersecurity related articles.
Coming soon
Volunteer Adventures
Contact
Elements
Text
This is bold and this is strong. This is italic and this is emphasized.
This is superscript text and this is subscript text.
This is underlined and this is code: for (;;) { ... }
. Finally, this is a link.
Heading Level 2
Heading Level 3
Heading Level 4
Heading Level 5
Heading Level 6
Blockquote
Fringilla nisl. Donec accumsan interdum nisi, quis tincidunt felis sagittis eget tempus euismod. Vestibulum ante ipsum primis in faucibus vestibulum. Blandit adipiscing eu felis iaculis volutpat ac adipiscing accumsan faucibus. Vestibulum ante ipsum primis in faucibus lorem ipsum dolor sit amet nullam adipiscing eu felis.
Preformatted
i = 0;
while (!deck.isInOrder()) {
print 'Iteration ' + i;
deck.shuffle();
i++;
}
print 'It took ' + i + ' iterations to sort the deck.';
Lists
Unordered
- Dolor pulvinar etiam.
- Sagittis adipiscing.
- Felis enim feugiat.
Alternate
- Dolor pulvinar etiam.
- Sagittis adipiscing.
- Felis enim feugiat.
Ordered
- Dolor pulvinar etiam.
- Etiam vel felis viverra.
- Felis enim feugiat.
- Dolor pulvinar etiam.
- Etiam vel felis lorem.
- Felis enim et feugiat.
Icons
Actions
Table
Default
Name |
Description |
Price |
Item One |
Ante turpis integer aliquet porttitor. |
29.99 |
Item Two |
Vis ac commodo adipiscing arcu aliquet. |
19.99 |
Item Three |
Morbi faucibus arcu accumsan lorem. |
29.99 |
Item Four |
Vitae integer tempus condimentum. |
19.99 |
Item Five |
Ante turpis integer aliquet porttitor. |
29.99 |
|
100.00 |
Alternate
Name |
Description |
Price |
Item One |
Ante turpis integer aliquet porttitor. |
29.99 |
Item Two |
Vis ac commodo adipiscing arcu aliquet. |
19.99 |
Item Three |
Morbi faucibus arcu accumsan lorem. |
29.99 |
Item Four |
Vitae integer tempus condimentum. |
19.99 |
Item Five |
Ante turpis integer aliquet porttitor. |
29.99 |
|
100.00 |