Projects
Throughout my academic and professional journey, I have actively engaged in various internships and projects that have honed my skills in cybersecurity, software development, and technical problem-solving. These experiences have provided me with a robust foundation in practical applications of cybersecurity concepts, network analysis, and system design. Below is a detailed overview of some key projects and internships that showcase my technical expertise and problem-solving abilities.
Bluetooth-Controlled Robotics System
I developed a Bluetooth-Controlled Robotics System utilizing an Arduino-based setup. This project enables remote operation of the robot through a custom Android application connected via Bluetooth.
Key Components:
HC-05 Bluetooth Module: Facilitates wireless communication between the robot and the Android app.
L298N Motor Controller: Controls the robot’s motors, allowing precise management of movement and speed.
Arduino Microcontroller: Processes input from the Bluetooth module and controls the motors accordingly.
Custom Android Application: Created a user-friendly app that provides intuitive control over the robot’s direction, speed, and other functionalities.
Achievements:
Successfully implemented wireless control, ensuring effective and responsive communication between the robot and the app.
Demonstrated reliable motor control with accurate movement responses.
Future Enhancements: Potential upgrades include adding advanced sensors for enhanced functionality, integrating video streaming capabilities, and refining control algorithms for better performance.
Applications: This system is ideal for educational use, robotics competitions, and personal hobby projects, showcasing the potential of combining wireless technology with robotics.
Cross-Platform Browser Extension for Enhanced User Privacy and Security
Project Overview: Conducting dissertation research on developing a cross-platform browser extension to enhance user privacy and security through randomized VPN routing. This project is part of my Master of Science in Cyber Security at the University of Aberdeen.
Key Points:
Objective and Goal:
The main goal of the project is to create a browser plugin that randomly connects to a Virtual Private Network (VPN) for each opened browser tab. This approach aims to increase user privacy by protecting sensitive data, preserving user privacy, and preventing tracking and profiling by third-party websites.
Technical Implementation:
The plugin is being developed using JavaScript, HTML, and CSS. It aims to ensure compatibility with widely used browsers. Key technical challenges include finding suitable VPN protocols and integrating effective VPN APIs.
Challenges Faced:
One of the significant challenges has been identifying and integrating useful VPN APIs, which has impacted the completion of the VPN component. Despite these difficulties, the project emphasizes the importance of overcoming technical hurdles to achieve privacy enhancement.
Achievements:
Successfully developed the core structure of the plugin using JavaScript, HTML, and CSS. The project has highlighted the critical need for innovative privacy solutions in the digital sphere, showcasing potential advancements in technology to enhance user privacy and security.
Future Prospects:
Future plans include investigating open APIs, improving privacy strategies, enhancing user experience, strengthening security measures, and launching educational initiatives to raise awareness about online privacy. The project’s current state reflects challenges but underscores the importance of collaboration, flexibility, and ongoing development in online privacy
Conclusion: This project stands as an example of the dedication to advancing user privacy and invites participation in the ongoing effort to secure the digital environment.
IoT-Enabled System for Real-Time Pond Monitoring in Shrimp Aquaculture
Project Overview: Completed my undergraduate thesis on designing an IoT-enabled system for real-time pond monitoring and data-driven nutrient management decisions in shrimp aquaculture. This project was part of my Bachelor of Technology in Computer Science and Engineering at Karunya Institute of Technology and Sciences.
Key Points:
Objective and Importance:
The project aims to address critical issues in the freshwater shrimp fisheries sector, which is vital to the country's economy. Factors such as rapid population growth, environmental pollution, and global warming have negatively impacted shrimp production. The system focuses on maintaining optimal conditions for shrimp farming by continuously monitoring crucial environmental parameters.
Environmental Parameters Monitored:
The system monitors key factors essential for shrimp production, including water acidity (pH), salinity, turbidity, and dissolved oxygen levels. Continuous monitoring of these parameters ensures the health and growth of shrimp, thereby maintaining the quality and yield of shrimp farms.
Technological Implementation:
The monitoring system leverages microcontroller-based physical devices and Internet of Things (IoT) technology. This combination allows for real-time data collection and remote monitoring. Users can receive alerts and notifications about any critical changes in the environmental parameters, enabling timely and effective interventions.
Advantages Over Manual Monitoring:
Unlike traditional manual monitoring systems, which are time-consuming and inefficient, the IoT-enabled system provides continuous, real-time data. This automated approach ensures that the necessary environmental conditions are maintained without the need for constant human oversight, significantly improving efficiency and productivity.
Future Prospects and Impact:
The project demonstrates the potential for technological innovation in shrimp aquaculture, emphasizing the importance of real-time monitoring and data-driven decision-making. Future developments could include further integration of advanced data analytics and machine learning to optimize nutrient management and enhance overall farm productivity. This project highlights the critical role of technology in addressing environmental challenges and supporting sustainable aquaculture practices.
Conclusion: This project exemplifies the application of IoT technology in aquaculture, showcasing its potential to enhance the efficiency and sustainability of shrimp farming. It stands as a testament to the importance of continuous innovation in ensuring food security and supporting economic growth in the fisheries sector.
Investigation and Exploitation Using Google Hacking Techniques
A) Website Penetration Testing with SQL Injections
Objective: The objective of this project was to demonstrate vulnerabilities in web applications using SQL injections, both manually and with the assistance of Burp Suite.
Methodology:
Manual SQL Injections:
Selected random websites listed in the Google Hacking Database.
Identified forms susceptible to SQL injection by inputting special characters to manipulate SQL queries.
Exploited vulnerabilities to gain unauthorized access to the admin panel.
SQL Injections using Burp Suite:
Configured Burp Suite as a proxy to intercept and modify HTTP requests.
Used Burp Suite's SQL injection tool to automate detection and exploitation of SQL vulnerabilities.
Analyzed results and extracted sensitive information from the targeted websites.
Outcome: Successfully accessed admin panels of vulnerable websites, highlighting the importance of secure coding practices and robust input validation.
B) Live Cameras Exploitation using Google Hacking Database
Objective: The objective of this project was to locate and access live cameras using search queries from the Google Hacking Database.
Methodology:
Utilized Google Hacking techniques to search for publicly accessible cameras.
Identified cameras by exploiting default or weak credentials.
Accessed live camera feeds to demonstrate potential security risks and privacy concerns.
Outcome: Demonstrated how easily accessible cameras can be compromised, emphasizing the need for secure configurations and password management practices.
Conclusion: This project underscored the critical need for vigilance in cybersecurity practices, including secure coding, regular vulnerability assessments, and adherence to best practices in web application security and IoT device management. It also highlighted the ethical implications and responsibilities associated with information security research and penetration testing.
References:
Google Hacking Database (GHDB)
Burp Suite Documentation
SQL Injection Testing Guides
Network and Camera Security Best Practices