Summary
Programming Skills
Accomplishments
Overview
Links
Reversing Engineering Skills
Malware Analysis Skills
Penetration Testing
Tools
Work History
Education
Timeline
Generic
Dilip Nair

Dilip Nair

Software Developer and Security Researcher
Palakkad,Kerala

Summary

My main expertise in software development is in C/C++ and C#. I have developed a full desktop based application in WPF (a Host Based Intrusion Detection System (HIDS)). As I am a Cyber Security post-graduate, I am also researching in the field of Reverse Engineering and Malware Analysis, along with that I am also proficient in Linux, Cryptography, Computer Networks, native Windows and Linux APIs.

Programming Skills

  • C, C++, C#, .NET, WPF, MVVM, XAML, PRISM, Razor, ASP.NET Core MVC
  • ASP.NET Core WebAPI, MSSQL, ADO.NET
  • API testing using Swagger and Postman
  • Entity Framework and Identity Framework, SOLID Principles
  • Bash, Powershell, Visual Studio and Visual Studio Code
  • Familiar with WinAPI, COM API, HTML, CSS, Javascript, Jquerry, Blazor and Java
  • Also familiar with ARM based architecture

Accomplishments

  • Developed a Host based Intrusion Detection System, a desktop application for Windows OS in .NET.
  • It monitors the processes and files in the background.
  • The admin keep restrictions on the processes and files in the system.
  • The application will monitor for the violation of these restrictions and will trigger an alert in the system if any violation occurs.
  • Also there are some experimental features like Process Port Mapper, Services Monitoring, User Input Monitoring (Keystroke logger, mouse clicks and coordinates logger), packet capturing (both ethernet and wifi) and Alerts mailing.
  • Also there is an authentication mechanism with MSSQL server.

Overview

3
3
years of professional experience

Links

GitHub Repo link for this Project :

https://github.com/DilipCNair/RBS


Project Portfolio Link (One Drive) :

https://1drv.ms/b/s!AtVXrUNZYOgHuTsG94XOyaVjyZp7?e=12XOXl


Reversing Engineering Skills

  • Reversing Malware using IDA,
  • Binary patching, binary debugging, reversing jumps
  • Looking at the Import table, Export table, Sections, Functions and Strings
  • Locating main, renaming functions, variables, labels and adding suitable comments wherever necessary, x86-64 Assembly Language
  • Finding Code and Data Xrefs, analyzing the logic flow using Xref graphs from and to a function
  • Backtracking from suspicious strings or APIs to the beginning of the Logic (i.e. main)
  • Finding dynamically resolved APIs, function calling conventions like Standard Calls and Fast Calls,
  • Follow string and register operations,
  • Watching a memory location for any change in real time
  • Traversing through the API chain to understand the functionalities

Malware Analysis Skills

  • Procuring and Analyzing Malware
  • Static and Dynamic Analysis of Malware in a Sandboxed Environment (Windows VM and REMNUX)
  • PE and ELF File Format, Metadata Analysis, Strings Analysis (ASCII and Unicode strings)
  • Analyzing Malicious EXEs as well as DLLs, analyzing Shellcodes
  • Entropy checking in Malware
  • Looking for Encoded strings and Cryptographic Signatures
  • Unpacking Malware using xdbg,
  • Dumping unpacked code from xdbg
  • Fixing the dumped code
  • Debugging and Monitoring malware execution using IDA, Signature building using Yara
  • Cryptography, native Win APIs and Linux APIs (POSIX Standards)
  • Operating System Internals and Kali Linux

Penetration Testing

  • Network and Open Ports Enumeration
  • Looking for Vulnerabilities and finding exploits against vulnerabilities
  • Exploiting using public exploits , exploitdb and metasploit
  • Web hacking using burpsuite, exploiting vulnerabilities like XSS, CSRF,SSRF, File Incluson and Upload, Command Injection etc
  • Linux Privilege Escalation
  • Catching reverse shells using netcat and Socket Programming

Tools

For Reversing Malwares:

File, Trid, DetectItEasy, CFF Explorer, PEiD, PE Studio, PE bear, Resource Hacker, IDA, signsrch, pecli, pehash, peres, xdbg, processhacker, procmon, regshot, Inetsim, fakedns, FakeNet-NG, wireshark, procdot etc...


Penetration Testing Tools:

metasploit, exploitdb, msfvenom, nikto, wpscan, nmap, netcat, burpsuite, nasm, gdb, objdump, strace, ltrace etc...

Work History

Art of Living Volunteer (Social Service)

Art of Living Center - Thuravoor
Alapuzha, Kerala
02.2020 - Current

Participating and volunteering the activities for conducting Art of Living courses by Sr. International Teacher Girish Kumar Sir.

Programmer Analyst

Cognizant
Chennai
09.2017 - 01.2018

I was part of a DR testing team (Disaster recovery testing), where we simulate a disaster and test how an application responds to it. Clients across the world come to us to check how resilient are their applications against any disaster. So we test it and then document the whole process and submit the report to the client.

Education

M.Tech - Information And Network Security

Nirma University
Ahmedabad, GJ
06.2015 - 05.2017

B.Tech - Computer Science And Engineering

University of Calicut
Kozhikode, KL
06.2010 - 05.2014

Timeline

Art of Living Volunteer (Social Service)

Art of Living Center - Thuravoor
02.2020 - Current

Programmer Analyst

Cognizant
09.2017 - 01.2018

M.Tech - Information And Network Security

Nirma University
06.2015 - 05.2017

B.Tech - Computer Science And Engineering

University of Calicut
06.2010 - 05.2014
Dilip NairSoftware Developer and Security Researcher