Languages in which I have worked in includes x86 Assembly, C, Java, Python, Ruby,
I have been developing web application in RAILS, Ember.js, Node.js, native android applications, embedded firmwares as Software Developer.
I like working in the fields of InfoSec, software development, wireless security and web development.
I also like dreaming, peace, sometimes being alone, brain storming and milk powder.
Currently I am working full time at where I am breaking existing monoliths into micro services using both reactive and orchestration architecture.
I was lead developer (electronics + software) in building this.
This baby shoots and detonates bombs..!!
This project takes advantage of flaw in the data link layer of IEEE 802.11 (wifi) protocol. A denial of service attack is made on wireless network by proactively sniffing for stations connected to targeted access point and injecting deauth packet for them. A deauth packet is injected for each station connected to wireless access point. Sniffer thread continuosly monitors for data packet to detect connected stations. Injector thread injects deauth packet for each station connected to targeted access point.
A computer network worm which exploits RPC DCOM vulnerability in unpatched windows XP to spread on the network. Image below shows the detection ratio of worm when it was written.
Worm does following:
-Adds startup entry in windows registry when executed first time.
-Detects all the network interfaces device is connected.
-Scans for other systems in the subnet and tries to infect them using RPC DCOM exploit.
There are several attacks against wifi taking advantage of data link layer flaws in IEEE 802.11 protocol. This project is a simple python script which detects data link layer attacks by monitoring the packet count, timestamp, radiotap headers of each management frame.
Creates fake wifi access points by injecting fake 802.11 beacon packets in monitor mode.