Juice Shop hacking
- Leveraged tools including Burp Suite, sqlmap,OWASP ZAP, Nmap,custom scripts, and others to identify and exploit security weaknesses effectively.
- Completed various tasks involving vulnerability discovery and recommended preventive measures.
- Successfully hacked website pages using the mentioned toolsand completed a total of 80 stars worth of tasks.
[20/11/2023 – 28/11/2023 ]
Man in the middle attack
- Implementeda Man-in-the-Middle (MitM)attack simulation using tools like Wireshark and ARP spoofing to intercept and manipulate network traffic in my university server.
- Demonstrated the impact of MitM attackson network securityand devised mitigation strategies to safeguard against such threats.
- Performedcomprehensive testing and analysis to identify vulnerabilities and strengthen networkdefenses against MitM attacks.
[12/2021 – 06/2022]
Topic - AndroidMalware Detector
- Identifies whether a given application contains malware or not.
- Determines the type of virus present and assists in safeguarding mobile devices by employing YARA rules prior to app installation.
- Utilizes Wireshark for monitoringnetwork traffic generatedby potential malware.
- ImplementsCrowdStrike as an Endpoint Detectionand Response (EDR) tool to monitor and respond to malware on endpoints.
I ensured completion of assigned projecttasks during the execution phase, including testing,operational assessment, and implementation activities.