🕺About Me

Me, Myself and More....

👋 Hello There...

I am a graduate student at UTS Sydney, majoring in Cybersecurity. My passion lies in malware research, exploit development, and malware analysis. As an OSCP, CRTO and CRTL professional, I actively engage in vulnerability assessments, malware research, and cybersecurity projects.

Links: GitHubarrow-up-right | LinkedInarrow-up-right | Twitterarrow-up-right | ORCIDarrow-up-right


🏆 Certifications


💼 Experiences

chevron-rightResearch Intern @ IIT Bhubaneswarhashtag

• Designed a distributed system that incorporates an agent-controller architecture to prevent data poisoning attacks. • Incorporated ECDH and zk-SNARK based authentication measures in the distributed system. • Implemented the distributed system in Golang using Gnark and Openssl libraries.

chevron-rightSecurity Engineer Intern @ Bugbasehashtag
  • Developed Active Directory internal assessment modules for RedTeam Copilot, enhancing the tool’s capability to simulate real-world attack scenarios

  • Created custom scripts for enumeration and exploitation in Sliver C2 using Sliverpy.

  • Automated deployment of expendable payloads, C2 redirectors, and SMTP relays using Terraform.

  • Contributed to the design and development of a custom C2 framework with AI-based agents.

  • Integrated netexec tool into the copilot agent for automated deployment when run on a target system.

chevron-rightBreach Point Intern @ ISAChashtag
  • Conducted VAPT assessments on Government of India infrastructure.

  • Performed vulnerability scans for critical industrial sectors such as aviation, power, and finance.

  • Documented and responsibly disclosed proof-of-concept exploits for discovered vulnerabilities.

  • Promoted to team leader after two months, managing a team of interns and coordinating vulnerability assessments.


🎤 Conference Presentations

chevron-rightOne Does Not Simply Write A Stable BOF @ CSECCON IVhashtag
  • Delivered a technical presentation on the intricacies of developing stable Beacon Object Files (BOFs) for command-and-control frameworks.

  • Analyzed common causes of BOF instability and outlined a comprehensive, 10-step methodology for ensuring BOF stability.

  • Highlighted the importance of using specialized tools like boflint for static analysis and thorough testing in controlled lab environments to ensure operational reliability.

chevron-rightThe Threat Triplet: RATs, Keyloggers, and Registry Keys @ HINT-24 hashtag
  • Demonstrated how RATs, keyloggers, and registry keys compromise systems together.

  • Explored persistence techniques used in modern malware.

  • Provided detection and mitigation strategies to counter these threats.

  • Research Paper was published in Springer Lecture Notes in Networks and Systems - LNNS


🔬 Publications

chevron-rightCurveLock: Exploring Elliptic Curves Implementation in Modern Ransomware (IEEE Access)hashtag
  • Investigated advanced anti-analysis and evasion techniques by manipulating the Windows OS at a low level, including API hammering and process hollowing.

  • Created a ransomware analysis prototype utilizing Elliptic Curve Cryptography (ECC) to encrypt files. It provided deep insights into how ECC can be misused.

  • Embedded mechanisms for escalating privileges, including token manipulation and abuse of high-privileged processes.

chevron-rightA Threat-Informed Approach to Malware Evasion using DRM and TLS Callbacks (IEEE Access)hashtag
  • Researched on a malware evasion attack chain, demonstrating how Digital Rights Management (DRM) and TLS callbacks can be repurposed to create stealthy threats.

  • Developed "ShadowChain," a proof-of-concept that locks itself to a specific PC using DRM, making it invisible to sandbox environments. It includes pre-execution anti-debugging with TLS callbacks and IAT camouflage to hide from security tools.

  • Demonstrated that the malware could bypass commercial antivirus software and thwart debuggers in a controlled lab setting.

chevron-rightThe Threat Triplet: RATs, Keyloggers and Registry Keys—A Proof of Concept Analysis (Springer Lecture Notes in Networks and Systems)hashtag
  • Demonstrated the synergistic destructive potential of remote access trojans, keyloggers and registry keys.

  • Developed a proof-of-concept to show the aforementioned synergy and tested it in a controlled environment with multiple AV solutions.

  • Gave detection and prevention techniques to detect and prevent the unholy trinity.


®️Patents

  • System And Method For Detecting And Preventing Code Execution In Unauthorized Memory Regions.

Last updated