Postgraduate Cyber Security student at the University of Surrey with an Electronics Engineering background from Mumbai. Expertly bridging the gap between hardware logic, network-layer infrastructure defense, and cloud service integration via advanced containerization orchestration, infrastructure automation, and secure operational logic.
Empirical WAF security mapping, stateful token duplication replays, multi-pass decoding bypass evaluation, rule-level log analysis, and firewall/VPN boundary testing strategies.
Architecting production asynchronous logic flows, container orchestration, programmatic microservices tracking, and establishing isolated secure edge tunneling protocols.
Architected and deployed a containerized, stateful asynchronous backend automation workflow designed to ingest unstructured pilot post-flight logs, process payloads through strict validation boundaries, and expose interactive distributed endpoints using secure communication channels.
cloudflared daemon (Cloudflare Tunnel), mapping public edge addresses to inner webhooks without opening hazardous inbound router ports on local firewalls.$execution.resumeUrl) embedded into Telegram callback channels, letting managers review, selectively edit, or reject transactions natively on-screen without active memory leaks.Evaluated the perimeter resilience of ModSecurity v3 coupled with OWASP CRS 3.3.7 on Apache 2.4 fronting the Damn Vulnerable Web Application (DVWA)[cite: 17, 18]. Developed a token-preserving request duplication layer to measure exactly how input transformations distort structural parsing across strict threshold configurations[cite: 19, 20].
| Attack Class | Payload Vector / Obfuscation Style | C1 (PL1/5) | C2 (PL2/10) | C3 (PL3/15) | C4 (PL4/20) |
|---|---|---|---|---|---|
| SQLi | 'OR "1"="1 (With spaces/folding) [cite: 380, 913] |
Blocked [cite: 663] | Blocked [cite: 663] | Blocked [cite: 663] | Blocked [cite: 663] |
| SQLi | /**/OR/**/'1'='1 (Inline Comment Padding) [cite: 380, 918] |
Blocked [cite: 663] | Blocked [cite: 663] | Blocked [cite: 663] | Blocked [cite: 663] |
| XSS | <script>alert(1)</script> (Direct Element Injection) [cite: 380, 920] |
Reached [cite: 663] | Reached [cite: 663] | Blocked [cite: 663] | Blocked [cite: 663] |
| XSS | <img src=x onerror=alert(1)> (Attribute Breakout) [cite: 380, 921] |
Reached [cite: 663] | Reached [cite: 663] | Blocked [cite: 663] | Blocked [cite: 663] |
| CMD | 127.0.0.1 && whoami (Chained Shell Operator) [cite: 380, 925] |
Blocked [cite: 663] | Blocked [cite: 663] | Blocked [cite: 663] | Blocked [cite: 663] |
| CMD | 127.0.0.1%257C uname -a (Double Encoded Pipe) [cite: 380, 927] |
Blocked [cite: 663] | Reached [cite: 663] | Blocked [cite: 663] | Reached [cite: 663] |
%257C) trigger scoring anomalies that result in sub-threshold execution slips[cite: 228, 229].Enrolled within a fully National Cyber Security Centre (NCSC) certified program housed at an Academic Centre of Excellence in Cyber Security Research (SCCS). Advanced training focuses heavily on implementing secure engineering defenses, defensive software design, and perimeter threat modeling:
Four-year professional engineering foundation providing an extensive architectural edge. Merging strict physical hardware engineering backgrounds cleanly with software platform operations:
Professional Credentials: CompTIA Security+ — Course Training Completed