He has hands-on offensive security professional with a strong focus on endpoint security, cloud attack automation, and purple teaming.
Aside from the Offensive side, he also writes high fidility detection rules for EDR evasive malware techniques, signatures for malicious network traffic and AWS related attack vectors.
Perform Red/purple Team assessments on Client environments.
Perform Network PT and Thick Client Testing assessments.
Perform Threat detections/hunting on Cloud and On-prem environments to help detection engineers in authoring detections for identified bypasses, reducing blind spots across MITRE ATT&CK techniques.
Developing and deploying custom detections based on analysis of incidents and relevant adversary TTPs via “Detection as Code”.
Different EDRs, MDI and other Security Product evaluation.
Created Offensive CI/CD Pipelines and automated hunting for sensitive keywords in O365 environments.
Covert Custom C2 creation and Exfiltration related BOF development for BRC4 and Cobalt Strike.
Projects I have worked on:
Detection Engineering via Event logs (high level), Kernel Callback and ETWTi based ELAM drivers (low level) (On going projects):
Built Kernel drivers POCs and ETWTi based ELAM (Early Launch AntiMalware) drivers to detect process injection techniques like, thread hijacking, EarlyBird APC Injections, LSASS memory access (also for Silent process exit and Duplicate handle technique), PPID Spoofing and Process Hollowing, Ghosting, Herpaderping, LLMNR poisoning, Ransomware detection workflow, Named pipe based privilege escalation and lateral movement.
AWS Attack Simulation and Detection (On going projects):
All my works can found here: https://github.com/reveng007/AWS_Attack_Simulation_Detection_Lab
SharePoint Sensitive Keyword Hunting:
Queried live enterprise SharePoint sites using Microsoft Graph API + KQL (Keyword Query Language) to identify exposed sensitive data.
WPAD Assessment:
Investigated WinHttpAutoProxySvc attack surface under disabled WPAD configs.
MDE Exclusion Bypass:
Evaluated Microsoft Defender Exclusion visibility and abuse even under “HideExclusionsFromLocalAdmins” policy.
Privilege Access Management Product Abuse:
Discovered multiple UAC bypasses in Beyond Trust PAM solution while operating under restricted (low-flex) environments.
Windows 11 Endpoint Evaluation:
Performed holistic endpoint security review including Zscaler, DLP, MDE, and Beyond Trust.
Assessment of MDI via AD Attacks:
Ran 400+ test cases on Microsoft Defender for Identity involving ADCS, Kerberoasting, ACL abuse, and more, having 89% success rate in bypassing MDI.
Cloud Attack Automation (AWS):
Built adversary simulation tooling for FireCompass’ automation platform.
Malware & Ransomware Tooling:
Developed stealthy ransomware and evasive malware strains for internal red team assessments.