🕺About Me

Me, Myself and More....

👋 Hello There...

I am a graduate student at UTS Sydney, majoring in Cybersecurity. My passion lies in malware research, exploit development, and malware analysis. As an OSCP, CRTO and CRTL professional, I actively engage in vulnerability assessments, malware research, and cybersecurity projects.

Links: GitHub | LinkedIn | Twitter | ORCID


🏆 Certifications

CRTO
OSCP
CRTL
OSWP
Security +

Red Team Operator Badge

OSCP Badge

OSWP Badge

Security+ Badge

https://www.credly.com/badges/906f1ec8-c99f-484f-a8f5-32bbf13e4067/linked_in_profile


💼 Experiences

Research Intern @ IIT Bhubaneswar

• Designed a distributed system that incorporates an agent-controller architecture to prevent data poisoning attacks. • Incorporated ECDH and zk-SNARK based authentication measures in the distributed system. • Implemented the distributed system in Golang using Gnark and Openssl libraries.

Security Engineer Intern @ Bugbase
  • Developed Active Directory internal assessment modules for RedTeam Copilot, enhancing the tool’s capability to simulate real-world attack scenarios

  • Created custom scripts for enumeration and exploitation in Sliver C2 using Sliverpy.

  • Automated deployment of expendable payloads, C2 redirectors, and SMTP relays using Terraform.

  • Contributed to the design and development of a custom C2 framework with AI-based agents.

  • Integrated netexec tool into the copilot agent for automated deployment when run on a target system.

Breach Point Intern @ ISAC
  • Conducted VAPT assessments on Government of India infrastructure.

  • Performed vulnerability scans for critical industrial sectors such as aviation, power, and finance.

  • Documented and responsibly disclosed proof-of-concept exploits for discovered vulnerabilities.

  • Promoted to team leader after two months, managing a team of interns and coordinating vulnerability assessments.


🎤 Conference Presentations

One Does Not Simply Write A Stable BOF @ CSECCON IV
  • Delivered a technical presentation on the intricacies of developing stable Beacon Object Files (BOFs) for command-and-control frameworks.

  • Analyzed common causes of BOF instability and outlined a comprehensive, 10-step methodology for ensuring BOF stability.

  • Highlighted the importance of using specialized tools like boflint for static analysis and thorough testing in controlled lab environments to ensure operational reliability.

The Threat Triplet: RATs, Keyloggers, and Registry Keys @ HINT-24
  • Demonstrated how RATs, keyloggers, and registry keys compromise systems together.

  • Explored persistence techniques used in modern malware.

  • Provided detection and mitigation strategies to counter these threats.

  • Research Paper was published in Springer Lecture Notes in Networks and Systems - LNNS


🔬 Publications

A Threat-Informed Approach to Malware Evasion using DRM and TLS Callbacks (IEEE Access
  • Researched on a malware evasion attack chain, demonstrating how Digital Rights Management (DRM) and TLS callbacks can be repurposed to create stealthy threats.

  • Developed "ShadowChain," a proof-of-concept that locks itself to a specific PC using DRM, making it invisible to sandbox environments. It includes pre-execution anti-debugging with TLS callbacks and IAT camouflage to hide from security tools.

  • Demonstrated that the malware could bypass commercial antivirus software and thwart debuggers in a controlled lab setting.

The Threat Triplet: RATs, Keyloggers and Registry Keys—A Proof of Concept Analysis (Springer Lecture Notes in Networks and Systems)
  • Demonstrated the synergistic destructive potential of remote access trojans, keyloggers and registry keys.

  • Developed a proof-of-concept to show the aforementioned synergy and tested it in a controlled environment with multiple AV solutions.

  • Gave detection and prevention techniques to detect and prevent the unholy trinity.


®️Patents

  • (Pending) System And Method For Detecting And Preventing Code Execution In Unauthorized Memory Regions.

Last updated