About Me
I am a motivated and detail-oriented graduate in Cyber Forensics and Information Security with hands-on experience in security tools and networking fundamentals. With professional experience as a Digital Forensic Analyst at FDI LABS, I have collaborated with government agencies including the Income Tax Department and Enforcement Directorate during raids to identify, extract, and preserve digital evidence.
My expertise spans digital forensics, vulnerability assessment, penetration testing, and incident response. I have utilized advanced forensic tools like FTK Imager, Autopsy, and various steganography tools for comprehensive data acquisition and analysis. I maintain strong analytical skills and am committed to protecting digital infrastructures through continuous learning and professional excellence.
Currently pursuing advanced cybersecurity training with GenAI through NIIT, I stay current with emerging threats and cutting-edge defensive strategies. I am passionate about handling real-world digital investigations and contributing to the cybersecurity community.
Certifications & Training
Certified Cybersecurity Specialist
NIIT (powered by StackRoute)
Successfully completed the Cybersecurity with GenAI Advanced Program
Date: March 29, 2025 | Duration: June 27, 2024 - October 24, 2024
Internship in Cyber Security
Ozone Cyber Security, Tiruchirappalli
Certificate of Attendance - Internship Program
Date: December 23, 2020 | Duration: January 1, 2020 - December 23, 2020
Certificate No: 0223122008
Introduction to Careers in Cybersecurity
Cybrary
1 CEU/CPE and 2 hours of training
Date: November 20, 2024
Certificate No: CC-11463867-0c1a-400c-8c5f-128d47e878f8
Cloud Governance Principles
Cybrary
1 CEU/CPE and 1 hour of training
Date: November 12, 2020
Certificate No: CC-4a89ccdd-8d86-4497-8cb8-6e057097a94f
Welcome to Cybrary
Cybrary
0 CEUs/CPEs and 1 hour of training
Date: November 12, 2020
Certificate No: CC-03618202-6213-4c60-9b2f-cc6b17916f52
Skills & Expertise
Digital Forensics
Penetration Testing
Security & Monitoring
Frameworks & Cloud
Programming & Scripting
Network & Infrastructure
Featured Projects
InvisiText: Steganography Tool
InvisiText is a Python-based steganography tool that allows you to seamlessly hide secret messages within images using the Least Significant Bit (LSB) technique. It provides an intuitive graphical interface for encoding and decoding hidden data, ensuring minimal visual alteration to the carrier images.
Enhanced Security System (Pattern-Based Authentication)
A pattern-based password authentication scheme developed to overcome vulnerabilities of traditional textual passwords, such as shoulder surfing attacks. The user registers a pattern and then logs in by entering textual passwords in a specific order based on that pattern. The password grid is mutated with random characters at every login, enhancing security and making it difficult to compromise.
My Cybersecurity Lab
Lab Environment Overview
My personal cybersecurity lab serves as a controlled environment for security research, vulnerability testing, and skill development. The lab includes multiple virtualized networks, threat simulation capabilities, and comprehensive monitoring systems.
Key Features:
- Isolated network segments for safe testing
- Multiple operating systems and vulnerable applications
- Real-time threat monitoring and analysis
- Automated malware analysis sandbox
- Digital forensics workstation with specialized tools
- Penetration testing arsenal and custom scripts
Research & Development
Continuous research into emerging threats, attack vectors, and defensive strategies. Regular participation in CTF competitions and vulnerability research programs.
Current Research Areas:
- AI-powered threat detection and response
- Advanced persistent threat (APT) analysis
- Zero-day vulnerability research
- Blockchain and cryptocurrency forensics
- IoT security and embedded systems
- Mobile device forensics and security
🔒 My Cybersecurity Lab – SOC Simulation
I have built a virtual SOC environment where I can practice both defensive (Blue Team) and offensive (Red Team) security skills, with planned upgrades to simulate real-world cybersecurity operations.
🟦 Blue Team (Defensive Tools & Monitoring)
These tools and setups defend, monitor, and respond to threats in my lab:
- pfSense Firewall (Network Perimeter Defense)
- Acts as the gateway between attacker machines and internal lab network
- Configured with WAN/LAN segmentation, NAT, and firewall rules
- Protects against unauthorized access
- Wazuh SIEM (Ubuntu Server – 10.10.10.52)
- Centralized log collection, correlation, and alerting
- Connected agents on Windows Server and Windows 10 endpoint
- Detects anomalies, malware, brute force, and privilege escalation
- Windows Server 2019 (AD, DNS, DHCP)
- Acts as Active Directory domain controller
- Provides user authentication, policies, DNS, and DHCP
- Logs forwarded to Wazuh for monitoring user logins, GPO changes
- Windows 10 Client (AD-joined workstation)
- Acts as an endpoint monitored by Wazuh
- Simulates a corporate user machine targeted by attacks
- Collects logs for incident detection and response
🔴 Red Team (Offensive Tools & Testing)
These simulate attacker techniques to test the defensive setup:
- Nmap – Network scanning, host discovery, service enumeration
- Metasploit – Exploit delivery, payload execution, privilege escalation
- Aircrack-ng – Wireless password cracking (for Wi-Fi testing)
- Hydra / Brute Force Scripts – Password spraying and brute force
- Kali Linux Tools – Phishing kits, exploitation, web app attacks (SQLi, XSS)
This allows me to simulate real-world attack scenarios against my lab and measure how the Blue Team tools detect and respond.
🚀 Future Concepts (Planned Additions)
I am expanding my lab to replicate a full SOC workflow, including ticketing and VAPT practice.
- IDS/IPS (Snort or Suricata)
- Network-based intrusion detection/prevention
- Detects malicious traffic in real time
- Complements Wazuh SIEM alerts
- Honeypots (Cowrie, Dionaea, Honeyd)
- Decoy systems that trap attackers
- Collect threat intelligence by logging their actions
- VAPT Lab (Penetration Testing Simulation)
- Vulnerability Assessment & Penetration Testing projects
- Learn core hacking methodologies in a safe environment
- Ticketing System (TheHive / MISP Integration)
- SOC-style incident tracking and response
- Connects Wazuh alerts → creates tickets → manage lifecycle
- Core Hacking Studies
- Malware analysis, exploit development
- MITRE ATT&CK simulation to cover red vs. blue scenarios
Security Tools Arsenal
Digital Forensics
- FTK Imager & Forensic Toolkit
- Autopsy Digital Forensics Platform
- Volatility Memory Analysis
- Sleuth Kit & Timeline Analysis
- Recuva & PhotoRec Recovery
- Hex Workshop & HxD
Penetration Testing
- Kali Linux & Parrot Security OS
- Metasploit Framework
- Burp Suite Professional
- Nmap Network Discovery
- Wireshark Protocol Analyzer
- John the Ripper & Hashcat
SIEM & Monitoring
- Wazuh SIEM Platform
- Splunk Enterprise Security
- ELK Stack (Elasticsearch, Logstash, Kibana)
- OSSEC Host-based IDS
- Snort Network IDS
- Nagios Network Monitoring
Get In Touch
Ready to collaborate on cybersecurity projects or discuss digital forensics challenges? I'm always open to connecting with fellow security professionals, researchers, and organizations seeking expertise in digital investigations and threat analysis. For any inquiries, please use the form below.