Post Job Free
Sign in

Python,Networking,Ethical Hacking,Web application Penetration Testing

Location:
Chennai, Tamil Nadu, India
Salary:
6LPA
Posted:
April 18, 2019

Contact this candidate

Resume:

D Kaushik Curriculum Vitae

**/*, *******************,********,***********,Madurai

Ó 730-***-**** Q ************@*****.***

Profile

Undergraduate Computer Science Engineer who is passionate about new technologies, with strong experience in various facets of Computer Science such as Networks and Security with good interpersonal skills for working in a team. Highly interested in Cyber Security and an ardent learner of new languages, frameworks and technologies. An optimistic, sincere and determined person with good self-image and self-esteem who can easily adapt to any situation and work individually or manage a team effectively. Education

Academic Qualifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

+

SSN College of Engineering Chennai

Computer Science and Engineering, CGPA 6.83/10 2015–2019(Expected)

+

Green Park Matric Higher Secondary School Namakkal State Board, 96.58% 2013–2015

+

Keren Matric High School Checkanorani

State Board, 97.8% 2003–2013

Skills

Technical. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

+ Strongest Areas – Networks, Database, Data Structures

+ Languages – Python, Bash Shell, C, C++, Java(Rudimentary)

+ Databases – Oracle, MySQL

+ Web Technologies – HTML, JavaScript, CSS

+ Platforms – Windows, Linux, Raspberry Pi3

+ Tools/Frameworks – Metasploit framework, nmap tool, Wireshark, Amitage, SET, Ettercap, BurpSuite Relevant Courses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

+ A+

+ Linux+ (Bash)

+ Network+

+ Security+

+ Python Programming

+ Oracle Database

+ Wifi-Hacking-Penetration-Testing from scratch

+ Web-Application-Penetration-Testing

+ Mobile Hacking

1/3

Projects

+ Bachelor’s Project (Ongoing): ’Drowsy Driver Detection in Vehicles using Raspberry Pi3’ I am part of a three member team developing a real time voice based interacting embedded system to monitor and alert a drowsy driver.

+ 3rd

year project: ’Crowd Funding Application’

A java application integrated with Oracle 11g that can maintain records of students and mentors and allot a student to respective mentor based on the areas of interest of both. Individual Projects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

+ Surveillance System

A secure application with two factor authentication system, that identifies individuals responsible for cellular phone abuse by monitoring all the devices connected to the local intranet. This application uses Python and Bash Shell for scripting, HTML, Java and JavaScript for front-end web page creation and app creation, and MySQL as back-end for web page.

+ Door Security System

A python based application deployed in Raspberry Pi which monitors visitors and intruders with the help of a camera installed on the door. This system protects the house against door breaching, lock picking, burglary and home invasion. A picture is taken when a person is detected at the doorstep and the picture is sent to the owner of the house as a warning through an android application.

+ Netcat Tool

A python based tool that can be used to chat, share files and perform basic terminal commands on a remote system. Also known as Swiss Army Knife in the Networking World.

+ Host Discovery

Discovers hosts and services on a computer network by sending packets and analyzing the responses. Implemented based on the UDP protocol where requests are flooded to unknown ports. If the response contains ICMP message of type 3 and Code 3 then the particular Host is said to be alive.

+ Chat Rooms

A command prompt based application that allows multiple users to share a common chat window.

+ YouTube Video Downloader

A GUI based application built on tkinter library that can download numerous publicly available YouTube videos at the same time. Lists all the available formats and resolutions of the video to be downloaded.

+ Man-In-The-Middle-Attack

An explanatory depiction on eavesdropping attack that occurs when a malicious actor inserts himself as a relay/proxy into a communication session between people or system. Workshops and Participations

+ Advanced Ethical Hacking Chennai Aug 2017 Attended an Ethical Hacking workshop conducted by

"Talented Pentesters Hut" and acquired knowledge on how hackers make use of the vulnerabilities present in various technologies to perform zero – day attack

+ Embedded System Development SSNCE Jul 2016 Acquired knowledge on the importance of Embedded Systems in everyday life and had a hands – on experience in Arduino Platform 2/3

Leadership Activities

+

EXLOG, Mathematics Symposium

Responsible for Organizing the events and decorating the venue Feb 2017, Feb 2018

+

INVENTE, Technical Symposium

Organized an event "Cryptomania" which is based on puzzles on Cryptography. Sept 2017

+

INVENTE, Technical Symposium

Responsible for Crowd Management and assisting students by answering their queries. Sept 2016 Achievements and Awards

+ Won first prize in Elocution Competition twice

+ Won first prize in Drawing Competition

+ Participated and secured Runner’s Up position in District and Zonal level Football Competitions

+ Won numerous prizes in 100 meters dash and shortput during the period 2010 – 2015 3/3



Contact this candidate