Securing the Digital World
A dedicated ethical hacker with a voracious appetite for learning new things. Interested in how things function, how they can be broken, and how they can be repaired. Since my school days, I've had a fascination with technology. Beginning with game creation in 12th grade with python programming, I expanded my knowledge as I developed by experimenting with other programming languages and completing numerous technical projects. This eventually led to my fascination with Cyber security and Hacking. I enjoy gathering and disseminating knowledge, as well as creating and finding better ways to do things.
Certifications :-
CNSS (Certified Network Security Specialist)
CCSS (Certified Cyber Security Specialist)
CCNA (Cisco Certified Network Associate)
OUR SOLUTIONS:
Web application security
Mobile application security
Network security
API Security Assessment
Cloud security
AWS Compliance audit
OSINT
Red team assessment
Digital Forensics
ICS/IT/OT audit
Thick client/Thin client
application audit
SOC
Firewall configuration review
Defacement Monitoring
Phishing simulation
Cyber security awareness training
Source code review
Finance Sector Audits ( Swifts,
ATMs, Payment Gateways)
Incident Response
Data Leakage Gap Analysis
Hall-of-Fames:
Apple, Nasa, Microsoft, Paytm, Uber, Huawei, Dell
Bounties:
Nike, Kapsons, Sidefx, Clodcannon, Apple, Swiggy, Clicktime
Work Terms
Phases:
Phase 1 ProjectData Gathering
Phase 2 Reconnaissance Phase
Phase 3 Static Testing (SAST)
Phase 4 Dynamic Testing(DAST)
Phase 5 Runtime Application Self
Protection (RASP)
Project Goals:
Identifying the vulnerabilities in the SOW.
Bypassing the implemented security controls.
Escalating privileges inside the network/hosts.
Accessing the sensitive data.
Data exfiltration using an encrypted channel.
Attachments (Click to Preview)
-
-
-