SHASHIKANT PAL
Cyber Security Student , JAVA Developer
Cyber Security Student , JAVA Developer
Computer Science Engineering student specializing in Cybersecurity with expertise in penetration testing, threat analysis, and vulnerability management. Proficient in Java programming, secure coding, and web application security, including OWASP Top 10 vulnerabilities. Skilled in using cybersecurity tools like Burp Suite, Metasploit, Nmap, and Wireshark. Passionate about applying cybersecurity best practices and secure development principles in a dynamic, security-driven environment.
Knowledgeable in cybersecurity, including penetration testing, vulnerability assessment, network security, and incident response. Familiar with cybersecurity tools such as Metasploit, Burp Suite, Nmap, and Wireshark, with an understanding of OWASP Top 10 vulnerabilities and secure software development. Proficient in Java programming, focusing on Object-Oriented Programming (OOP), API integration, and secure coding practices. Understanding of encryption techniques, system hardening, and data structures & algorithms (DSA) for efficient security and performance.
Proficient in network protocols, firewalls, intrusion detection systems (IDS/IPS), and security technologies.
Strong understanding of web application security and OWASP Top 10 vulnerabilities.
Experienced in penetration testing, vulnerability assessment, and threat analysis.
Penetration Testing & Exploitation: Metasploit, Burp Suite, SQLmap, Nikto, OWASP ZAP
Network Security & Analysis: Nmap, Wireshark, Acunetix, Netsparker
Password Cracking & Forensics: Hashcat, John the Ripper
Security Information and Event Management (SIEM): Understanding of log analysis and threat detection
Java Programming – Object-Oriented Programming (OOP), API integration, secure coding practices
Cybersecurity & Ethical Hacking – Penetration testing, vulnerability assessment, OWASP Top 10
Network Security – Firewalls, IDS/IPS, VPNs, TCP/IP protocols
Proficient in Windows and Linux security features, system hardening, and access controls.
Case Study on WannaCry Ransomware
Conducted a detailed analysis of the WannaCry Ransomware, examining its strategies, attack vectors, and system infiltration techniques to understand its impact on cybersecurity.
Research Paper: An In-Depth Analysis of the Tor Network
Collaborated on a research project analyzing the Tor network's privacy, security, and future prospects. Focused on studying anonymity mechanisms, encryption, and potential vulnerabilities within the network.
Web Vulnerability Scanner and Mitigator
Developed a Python-based web vulnerability scanner with a modular architecture to detect SQL Injection, XSS, and CSRF. Integrated Nmap for network scanning and ReportLab for generating detailed security reports, ensuring comprehensive security assessment and mitigation.