VMware & VirtualBox
Enthusiastic Cyber Security professional eager to contribute to team success through hard work, attention to detail and excellent organizational skills. Dedicated with history of accomplishing company goals utilizing consistent and organized practices. Skilled in working under pressure and adapting to new situations and challenges to best enhance the organizational principles. Motivated to learn, grow and excel in Cyber Security Industry.
Key Qualifications & Responsibilities
Key Achievements
IT INFRASTRUCTURE AND NETWORKING
1. Switch Configuration. 2. Switch Hardening.
Vulnerability Assessment and Penetration Testing
undefinedVMware & VirtualBox
Penetration testing tools
Cisco Packet Tracer
Android Studio
HackerU: "Master Certificate in Cyber Security (Red Team)"
CTF Challenges
Dark Web
Android & IOS Penetration testing
Bug Bounty Hunting
Python Scripting
Mini Project on "Home Automation Using Arduino":
"Developed a Smart Home which identifies the motion of people walking in & out where the lights are turned on/off, depends upon people residing in home. Also monitors the room temperature. The best part is it includes detection the gas leakage and alerts, in addition a window gets unrolled automatically to let pass the leakage gas and reverts back once no gas is detected."
Major Project on "Rogue Wi-Fi Penetration Framework":
"Developed a device which is a advance way to perform Blackbox testing on a wireless network". Its a quadcopter which carries a portable computer (Raspberry Pi) programmed with RougeSpy Script and some useful components such as RPI Camera, RF transmitter, GPS module, Software-defined radio (SDR) etc... It provides the use to overcome major issues such as: 1. Real-time analytics 2. Wardriving.
Using RWPF, we can perform a targeted attack, able to geolocate the location of the target once identified and track the data being generated during the work and store all data dumps in the databases. Moreover, the data can be monitored through a web application and we have a drone that can be controlled by radio-frequency via a web interface. Further, there is a scope to move forward this Wi-Fi technology with Base Station's ideology.
1.Practical Mobile App Attacks By Example. 2020-09.
2.Advanced SSRF Exploitation. 2020-09.
1. Mobile App Development. 2017-08
2. PC Troubleshooting, Backup Recovery, OS Installation & Software Configuration Management. 2016-10
HackerU: "Master Certificate in Cyber Security (Red Team)"
STAR Certification : "STAR CYBER SECURE USER"
STAR Certification : "STAR CLOUD COMPUTING"
EC COUNCIL : "CERTIFIED ETHICAL HACKER [CEH V10]"
MICROSOFT: "MICROSOFT TECHNOLOGY ASSOCIATE - CLOUD FUNDAMENTALS "