About
Security professional with expertise in threat research, threat detections, threat…
Activity
-
👉 Threat intelligence is a force multiplier. ❓ But do many people use it properly? 🎖️ I’ve seen folks often compare threat intelligence in…
👉 Threat intelligence is a force multiplier. ❓ But do many people use it properly? 🎖️ I’ve seen folks often compare threat intelligence in…
Liked by Arpan Abani Sarkar
-
Supercharge Cloud Security Operations with AI-Powered Cloud Exposure Management by AiStrike 🚀 AiStrike is redefining cloud security with…
Supercharge Cloud Security Operations with AI-Powered Cloud Exposure Management by AiStrike 🚀 AiStrike is redefining cloud security with…
Liked by Arpan Abani Sarkar
Experience
Education
Licenses & Certifications
Volunteer Experience
Patents
-
SYSTEM AND METHOD FOR PREVENTING A STEGOSPLOIT ATTACK
Filed US 16/680498
A system including a stegosploit attack prevention engine (SAPE) and a method for proactively preventing a stegosploit attack. The SAPE extracts multiple images from an image rendering component, for example, a webpage, received from a web server, prior to loading of the images on a computing device. Any one or more of the images is a compromised image including an exploit code and a decoder code embedded in the pixels of the compromised image. The SAPE generates a replacement image for the…
A system including a stegosploit attack prevention engine (SAPE) and a method for proactively preventing a stegosploit attack. The SAPE extracts multiple images from an image rendering component, for example, a webpage, received from a web server, prior to loading of the images on a computing device. Any one or more of the images is a compromised image including an exploit code and a decoder code embedded in the pixels of the compromised image. The SAPE generates a replacement image for the compromised image by manipulating pixels of the compromised image. The SAPE manipulates the pixels of the compromised image by filtering, compressing, and encoding the compromised image, thereby deactivating the exploit code and the decoder code of the compromised image. The SAPE embeds the replacement image in place of the compromised image in the image rendering component and delivers the replacement image to the computing device.
Other inventorsSee patent
Courses
-
Applied Cryptography
CS1127
-
Artificial Intelligence and Expert Systems
CS1017
-
Cloud Computing
CS1121
-
Computer Networks
CS1006
-
Computer Viruses and Malware Software
CSEC743
-
Cryptography and Authentication
CSEC604
-
Data Structures and Algorithm Design
CS1004
-
Enterprise Security
CSEC603
-
Ethical Hacking
CS1126
-
High Speed Networks
CS1128
-
Introduction to Psychology
PSYC 101
-
Management for Engineers
MB1016
-
Network Security
CSEC744
-
Object Oriented Analysis and Design
CS1009
-
Object Oriented Programming
CS1005
-
Operating Systems
CS1011
-
Penetration Testing
CSEC75
-
Principles of System Administration
NSSA605
-
Principles of Technology and Innovation Management
MB1203
-
System Software and Compiler Design
C1014
-
TCP/IP Principles and Architecture
CS1120
-
Theory of Computation
CS1013
-
Web Server and Application Security Audits
CSEC731
-
Web Technology
CS1019
Projects
-
Halberd : Offensive Security Testing Tool
Open source security testing tool to proactively assess cloud security by executing a comprehensive array of attack techniques across multiple surfaces (Azure, AWS, Entra ID/M365) via a intuitive web interface.
-
MAAD Attack Framework (MAAD-AF)
MAAD Attack Framework is an open source attack tool for simple, fast & effective security testing of M365 & Entra ID.
MAAD-AF is developed natively in PowerShell and leverages all living off the land techniques. -
Testing CNN Steganalyzer on Novel Images - Research
Tested the state of the art Convolutional Neural Network steganalyzer detection accuracy in the wild.
Created a very own stego image database resembling the Boss base image database, for testing. Through results, successfully proved the inefficiency of the CNN steganalyzer when detecting steganography in the wild. -
Countermeasure for attack Stegosploit - Research
Developed a prevention system by using pixel manipulation technique and implemented it directly at the application layer as a light weight browser tool to prevent the attack Stegosploit and keep internet a safe place.
Studied the attack mechanism to identify critical points in the attack process and targeted them to develop an effective prevention mechanism. -
Web Development project - www.CareerAdvisory.in
Project addressed tasks such as designing, setting up the site map and developing other features for the company’s official website www.careeradvisory.in
Other creatorsSee project
Languages
-
English
Native or bilingual proficiency
-
Hindi
Native or bilingual proficiency
-
Bengali
Elementary proficiency
-
Marathi
Elementary proficiency
-
French
Elementary proficiency
More activity by Arpan Abani
-
Reminder - in September as part of BruCON I'll teach a special, extended edition of my #ThreatIntelligence #CTI driven #DetectionEngineering and…
Reminder - in September as part of BruCON I'll teach a special, extended edition of my #ThreatIntelligence #CTI driven #DetectionEngineering and…
Liked by Arpan Abani Sarkar
-
The life of a Consultant Incident Responder. 🐙
The life of a Consultant Incident Responder. 🐙
Liked by Arpan Abani Sarkar
-
💡 Entra PowerShell is out!! We can go back to writing nifty one liners like this 💖 It's 💯% open source, so if you run into any issues please…
💡 Entra PowerShell is out!! We can go back to writing nifty one liners like this 💖 It's 💯% open source, so if you run into any issues please…
Liked by Arpan Abani Sarkar
-
Have you ever wondered how robust your identity security truly is? Our video features insights into #Microsoft Identity Security Testing, the…
Have you ever wondered how robust your identity security truly is? Our video features insights into #Microsoft Identity Security Testing, the…
Liked by Arpan Abani Sarkar
-
TLDR: - After 21 years, I’m graduating from Google! - I plan to take a sabbatical, spend time with my kids, and figure out my next gig [ideas welcome…
TLDR: - After 21 years, I’m graduating from Google! - I plan to take a sabbatical, spend time with my kids, and figure out my next gig [ideas welcome…
Liked by Arpan Abani Sarkar
-
On one hand, we see small companies struggle because they lack proper resources. On the other, LockBit claims to hack US Federal Reserve and hold…
On one hand, we see small companies struggle because they lack proper resources. On the other, LockBit claims to hack US Federal Reserve and hold…
Liked by Arpan Abani Sarkar
-
A few weeks ago I had the pleasure of giving a talk at Area41 in Zurich, Switzerland. My talk explained how we can phish for Primary Refresh Tokens…
A few weeks ago I had the pleasure of giving a talk at Area41 in Zurich, Switzerland. My talk explained how we can phish for Primary Refresh Tokens…
Liked by Arpan Abani Sarkar
-
I appreciate this may be a spicy topic and a little controversial, but why do vendors charge a premium for security features such as SSO or…
I appreciate this may be a spicy topic and a little controversial, but why do vendors charge a premium for security features such as SSO or…
Liked by Arpan Abani Sarkar
-
Four intense hours later - we are done! Great effort by all the #CyberSci players, hope you had fun. More hacking tomorrow! Many thanks to Trent…
Four intense hours later - we are done! Great effort by all the #CyberSci players, hope you had fun. More hacking tomorrow! Many thanks to Trent…
Liked by Arpan Abani Sarkar
-
For context, Microsoft is seeing 300,000,000 attacks per day (yes, 300M), that is 9,000,000,000 (9B) a month! That is up over 3x from previous years.…
For context, Microsoft is seeing 300,000,000 attacks per day (yes, 300M), that is 9,000,000,000 (9B) a month! That is up over 3x from previous years.…
Liked by Arpan Abani Sarkar
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More