About Me
Hello, I'm Harshul, and I'm passionate about everything related to cybersecurity. The dynamic nature of this field excites me, whether it's ethical hacking, penetration testing, or finding innovative ways to protect sensitive data. I enjoy the thrill of solving complex challenges and staying ahead in the ever-evolving digital landscape. Over time, I've gained valuable insights through my studies, certifications, and hands-on experiences. This website is my space to share those learnings, document my journey, and connect with like-minded individuals. Cybersecurity isn't just a career for me; it's a mission to make the online world safer and more secure for everyone. I'm excited about what lies ahead and look forward to growing further in this field!
Certifications
OSWE certification demonstrates advanced skills in identifying and exploiting vulnerabilities in web applications. It validates expertise in web application security through rigorous practical testing and mastery of the WEB-300 course
OSWP certification focuses on wireless network security. It demonstrates the ability to identify and exploit vulnerabilities in wireless networks, including cracking WEP/WPA encryption, achieved through the PEN-210 course and practical assessment
C|EH Practical certification highlights hands-on skills in ethical hacking through a rigorous practical exam. It tests the ability to apply hacking techniques in real-world scenarios to secure systems effectively
OSWA certification validates foundational skills in web application security. It demonstrates the ability to identify common vulnerabilities and understand core web exploitation techniques through practical testing and the WEB-200 course
eCPPT certification validates comprehensive penetration testing skills. It covers advanced topics like vulnerability assessment, exploitation, and reporting, emphasizing hands-on, real-world scenarios for web and network security
C|EH certification validates foundational skills in ethical hacking and cybersecurity. It focuses on understanding and mitigating threats by employing techniques used by malicious hackers
OSCP certification is a highly respected credential in penetration testing. It showcases hands-on skills in network exploitation, vulnerability assessment, and ethical hacking, achieved through the rigorous PEN-200 course and practical examination
C|EH Master certification demonstrates advanced expertise in ethical hacking by requiring candidates to pass both a theoretical and practical exam, showcasing deep technical knowledge and real-world problem-solving abilities
Education and Training
Cybersecurity Master's Degree at the University of Padua is a specialized program focusing on advanced topics in cybersecurity, cryptography, network security, and software protection. The curriculum includes theoretical foundations and practical applications, preparing graduates for roles in securing critical systems and combating cyber threats
IBM Cybersecurity Analyst Professional Certificate equips learners with essential skills in cybersecurity. It covers network security, incident response, threat management, and compliance, preparing individuals for roles like cybersecurity analyst through hands-on labs and industry-relevant projects
Security Engineer Path is designed to equip learners with the skills to design, implement, and maintain secure systems. It covers topics like network security, system hardening, vulnerability management, and secure software development through hands-on labs and practical exercises
SOC Level 1 Path focuses on the skills needed for a Security Operations Center (SOC) analyst role. It covers threat detection, incident response, log analysis, and SIEM tools through practical, hands-on exercises and real-world scenarios
B.Tech in ICT program at DA-IICT combines computer science, electronics, and communication engineering. It focuses on developing strong technical foundations in areas like software development, networking, embedded systems, and data science, preparing students for versatile careers in technology and innovation
Red Teaming Path provides comprehensive training in offensive security techniques used in real-world red teaming operations. It covers adversary emulation, lateral movement, privilege escalation, and post-exploitation tactics through interactive, hands-on labs and scenarios
SOC Level 2 Path builds on foundational SOC analyst skills, focusing on advanced threat detection, malware analysis, digital forensics, and incident management. It provides hands-on labs and real-world scenarios to prepare for higher-level SOC roles
Introduction to Cybersecurity Path is designed for beginners to build foundational knowledge in cybersecurity. It covers key topics like network security, basic cryptography, and common cyber threats through engaging, hands-on labs and interactive exercises
Ethical Hacker Nanodegree program from Udacity provides practical training in ethical hacking techniques and cybersecurity principles. It focuses on vulnerability assessment, penetration testing, and securing systems through hands-on projects and real-world scenarios
Offensive Pentesting Path provides comprehensive training in offensive security techniques. It covers vulnerability assessment, exploitation, privilege escalation, and post-exploitation skills, preparing individuals for real-world penetration testing through hands-on labs and practical scenarios
Cyber Defense Path focuses on defensive cybersecurity skills, including threat detection, incident response, malware analysis, and security monitoring. It provides hands-on labs and real-world scenarios to prepare learners for roles in cyber defense and security operations
Courses [Technical and Security]
-
Ethical Hacking
-
Digital Forensics
-
Mobile and IoT Security
-
Information Security
-
Cybersecurity and Cryptography: principles and practices
-
Computer and Network Security: Advanced Topics
-
Security Protocols
-
System and Network Security
-
Biometrics
-
Machine Learning
-
Deep Learning
-
Law and Data
-
Internet of Things and Smart Cities
Research Projects
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures [Masters Thesis]
My thesis proposes a novel approach to detecting drone invasions that utilize privacy-preserving protocols. The proposed approach can detect drones invading the restricted areas while maintaining the privacy of drones and organizations. This research provides a valuable contribution to the field of drone detection and privacy protection and can be applied in various domains. Overall, this work demonstrates the possibility of detecting drone intrusions while preserving the privacy of all parties involved.
Partial License plate matching protocol
Developed a privacy-preserving protocol for secure matching of Partial License Plate using Fully Homomorphic Encryption, using Microsoft SEAL library and other FHE schemes. It was acomplished by exploring wildcard based equality testing. The project was developed in C++ programming language.
QSecret-Sharing Scheme (QSS)-Based Keyless: Titanium Secure (TitaniumSec) EMail Application [ICTSCI'19]
This project was a part of research internship (B.Tech project) at Advanced Data Processing Research Institute, Department of Space. Our team developed a Secure Mail Web Application with Quasi Groups and modifications over Shamir’s Secret Sharing. This project was done using C++, Java and Python programming languages. HTML, CSS, Javascript, JQuery and PHP were also used for web development.
Efficient Implementation of Private License Plate Matching Protocols [SPACE'17]
Developed a secure and efficient privacy-preserving protocol for matching of License Plate using Paillier’s Partial Homomorphic Encryption. The project was developed in Java programming language.
Secure Cloud backup using Secret Sharing Schemes
Developed and implemented an efficient and secure Cloud backup using Secret Sharing Schemes. Its objective was to reduce the computation and communication costs with also maintaining CIA Triad. The project was developed in Go programming language.
Fast Private License Plate Matching Using Symmetric Homomorphic Encryption [IEEE ANTS'18]
This project is a subset of Private Set Intersection. For this project, I've developed a privacy-preserving protocol using Symmetric Homomorphic Encryption to compute Hamming distance between two license plate in cipher domain. The project was developed in C++ and Python.
Analysis of Return Oriented Programming (ROP)
Analysed ROP automation tools, Ropper and Ropgadget, and automated the generation of rop gadgets for different shellcodes. Also investigated defense techniques against such attacks.
An Enhanced Privacy-Preserving Recommender System [ISEA-ISAP'19]
Efficient and more secure practical privacy-preserving Recommender System using Additive Elgamal Cryptosystem. The project was developed in Python programming language.
Privacy Preserving Similar Document Matching
Implemented Simhash protocol, for document similarity, and Additive Elgamal Cryptosystem with Eventlet Server. It was part of Summer Research Internship. The project was developed in Python programming language.
Memory Corruption Vulnerabilities
Analysed Buffer overflow, Format strings and Heap overflow attacks with the exploit-exercise's protostar VM. Ret2Libc attack was also investigated alongwith them.
Course Projects
Understanding Privacy Risks on Android
Conducted a literature review to gain insights into the collection of private data on Android devices. Also investigated the impact of privacy regulations, like GDPR, on private information collection.
Secret Sharing Schemes and Image Steganography
Developed applications for secretly sharing information over public channels using Secret Sharing Schemes and JPEG Stegnography.
Airways Database System
For this project, my team had developed a database for Airways Schedule and reservation.
Shellshock Vulnerability: Implementation and Remediation Techniques
Implemented the Shellshock attack and observed the severity of the vulnerability and its countermeasures. Also, extended the attack over malicious DHCP server. SEED Labs VM was used for this project.
Home Automation
Developed a Home Automation and security system using Arduino and Raspberry Pi.
Wireless Earthquake Alarm System
Developed an Arduino based system to detect the Primary waves of an earthquake which are faster and far less dangerous than Secondary waves.
Face Recognition using CNN and KNN
Developed a Face Recognition application using Convolutional Neural Networks and KNN K-Nearest Neighbors algorithms.
Mini Operating System
For this project, my team had developed a mini operating system. The goal of the project was to understand how the OS works.
Community Activities
Survey of Tech-driven Smart City
Our team generated a report which provided an analysis of the development of one of Smart City in India, GIFT city (Gujarat International Finance Tec-City), Gandhinagar, Gujarat and its nearby areas.
Conducted Survey for Public Distribution System (PDS)
The objective of this survey was to understand the living conditions of people below the poverty line and the problems they face with the Public Distribution System (PDS).
Rural Internship
I served as a teacher with i-India NGO, where I worked in a school located in a slum area in Jaipur, where many children come from poor backgrounds. The goal of my work was to provide these children with education and opportunities for learning that they might not otherwise have had access to.
Digital Skills
Programming Languages
-
Bash
-
C
-
C++
-
Java
-
JavaScript
-
PHP
-
Powershell
-
Python
-
SQL
Cybersecurity Expertise
-
Active Directory Security
-
Cyber Threat Intelligence
-
Incident Response
-
Linux
-
Windows
-
Phishing
-
Privilege Escalation
-
Red Teaming
-
SIEM Tools
-
Vulnerability Assessment
-
Web Application Security
Cybersecurity Resources and Frameworks
-
CVE Details
-
MITRE ATT&CK Framework
-
OWASP
-
Tactics, Techniques, and Procedures
Cybersecurity Tools and Technologies
-
Android App Development (Android Studio)
-
Arduino
-
Raspberry Pi
-
GHIDRA
-
IBM Guardium
-
IBM QRadar
-
Chisel
-
Nmap
-
Nessus
-
Penetration Testing Tools
-
Machine Learning and Deep Learning Techniques
Data Privacy and Compliance Expertise
-
GDPR
-
ISO 27001
-
ISO 27002
-
NIST Framework
Professional Interests
-
Interactive Cybersecurity Training
-
Cryptography
-
Cybersecurity Compliance
-
Penetration Testing
-
Ethical Hacking
-
Data Security and Privacy
-
Operating Systems Security
-
Privacy-preserving Protocols
-
Research & Development
Hands-On Cybersecurity Experience
-
Capture The Flag (CTF)
-
Hack The Box: Pro Hacker
-
TryHackMe: Top 1%
-
Offensive Security Proving Grounds
Management and Leadership Skills
-
Convenor of Electronics Hobby Club at DA-IICT
-
Coordinator of Workshop on Manual and Autonomous Robotics at DA-IICT
Honors and Awards
-
Hack The Box: Pro Hacker
-
TryHackMe: Top 1%
-
Presented the paper titled, Fast Private License Plate Matching Using Symmetric Homomorphic Encryption at IEEE ANTS'18
-
Presented the paper titled, Efficient Implementation of Private License Plate Matching Protocols at SPACE'17
-
Achieved Second rank in Autonomous Line Following bot Competition at DA-IICT
-
Achieved Third rank in Autonomous Line Following bot Competition at IIT Jodhpur
Language Skills
-
Hindi: Mother Tongue
-
English: Fluent
-
Italian: Limited working proficiency
Hobbies
-
Participating in Capture the Flag competitions
-
Swimming
-
Playing Cricket and Badminton
-
Travelling