Memory Corruption - IoT Scenarios
Currently serving as Manager for vulnerability management at one of the largest infrastructure in india i.e Reliance Jio Infocomm Limited, Proven IT-Security specialist with having more than dozen of exploit published online in 0day.today, exploitdb, packetstorm, securityweek, author of few 0day and CVE, Author of K-auth authentication system and I-IPS (software appliance for IPS/IDS for small and large scale organization),Listed in few hall of fames like Apple, Nokia etc, conducted N number of VA/WA/PT for Reputed client, Implemented SIEM/SOC at large Media House, expertise in log analysis, scripting, technical audit, Linux, windows, Areas of interest in Information Security domain are: Buffer Overflows, exploitation, Reverse Engineering, Shell coding, Tool building, Malware analysis and IDS. Active Participant in Null community, designed CTF which was still unbreakable, Earlier working as Sr.Security analyst at network intelligence India Pvt .Ltd prior to security 3 years of extensive experience in administration.
||Security enthusiastic || Love Coding reverse engineering Exploitation || Security analyst || Linux
Starts at Saturday December 10 2016, 01:45 PM. The sessions runs for about 1 hour.