SlideShare a Scribd company logo
1 of 1
KASTURI UMAKANT PURAMWAR
Email: puramwarkasturi@gmail.com LinkedIn: https://www.linkedin.com/in/kasturipuramwar Cell No. +1 (408) 667 1671
OBJECTIVE: Actively seeking an Internship in field of networking/information-security.
EDUCATION:
Master of Science in Electrical Engineering (Networking). AUG 2017
San Jose State University, San Jose, CA GPA:3.6
(Internetworking, Network Security, Software Defined Data Centers, Wireless & Mobile networking, Broadband Communication)
Bachelor of Engineering, Electronic & Telecommunications JUNE2014
University of Mumbai, India GPA:3.25
(Computer Communication N/W, Optical Fiber Communication, Wireless Communication)
WORK EXPERIENCE:
Equinix (@ ProUnlimited) – Information Security Intern JUN 2016 – AUG 2016
 Performed day to day Information Security operations and tasks on Global Information Security projects which included 2-
Factor Authentication, Intrusion Detection Systems, Vulnerability Management, and user support.
 Worked in firewall operation support which included managing firewall rules using PaloAlto firewalls. Configuring the firewall
for an enterprise network. Handled load balancing operations using the f5 load balancers.
 Performed web application scanning and host scanning for vulnerability management. Assist in Information security policy
publishing by approving the policies before publishing. Wrote Quick start guides for Web application scanning and how to
create a v-wire. Also wrote a bash script for database backup from one server to other.
Teaching Assistant - San Jose State University AUG 2016 – DEC 2016
 Conduct labs using Matlab, LTspice, and Ipython to solve realistic continuous and discrete time signals, circuits and systems
problems. Application to passive and active circuits, to basic control, communications
TECHNICAL SKILLS:
 Software tools: PSPICE, MATLAB, Artwork PCB, SPJ stimulator, KEIL, Turbo C, Flash Magic, Microsoft Office, Nessus, Splunk,
Websense.
 Programming languages: Python, ASSEMBLY Language.
 Operating Systems: Linux, Windows, Mac, Backtrack Linux, Metasploitable, Kali Linux.
 Networking Protocols and Technologies: TCP/IP, UDP, HTTP, ARP, BGP, OSPF, VLAN, DHCP, MPLS, VPN, Wi-Fi, Bluetooth,
LTE, 3G/4G, ISIS, RIP, FTP, SNMP, SDN, 802.11, DSR, AODV, DSDV, SSL, IPsec
 Networking Tools: Wireshark, Cisco Packet Tracer, NS3, NS2.
 Transferable skills: Computing skills, Troubleshooting, Promoting Change, Goal Setting, Problem solving, Public Relations,
Improving, Conceptualizing, visualizing concepts, Clarifying problems, Researching.
ACADEMIC PROJECTS:
Software Defined storage
 Used NexentaStor to manage NAS/SAN based primary deployments by creating a Nexentastor environment to create and
manage virtual and physical storage devices. Created several volumes and managed those volumes. Created NFS-Share, CIFS
share folders and changed their default values and properties, configured CIFS and mounted NFS-share over NS instance.
BGP Prefix Hijacking MAY 2016
 Implemented a BGP topology using the quagga software routing suite. In prefix hijacking, hijacked a BGP prefix advertised by
a router by altering it by another prefix address so that announcement gets directed towards prefix owner. Prefix Hijacking is
implemented in a test bed environment provided by Deter labs.
Analyzing Honeypot Network (MHN) and Implementing a virtual honeypot MAY 2016
 Deployed a Honeypot and analyzed the origin, types, frequency, & IP spoofing of the attacks on the honeypot. We firstly
deployed a honeypot using MHN to detect what kind of attacks system is vulnerable to and then made our own virtual honeypot
and configured it to trace intruders. Also analyzed honeypots such as Snort, Suricata, Wordpot, Shockpot.
Performance analysis of Ad hoc routing protocols MAY 2016
 Generated and Analyzed the trace files for AD HOC routing protocols (AODV, DSR, DSDV) using NS2 for various scenarios.
Designed python script for creating the traces and developed a parser script in python for calculation of various parameters.
Implementation of VLAN’s using open vSwitch MAR 2016
 Implemented VLANs within a virtualized network. This is done through an Open vSwitch (OVS) that provides the required
virtualization by creating virtual instance of a switch. Multiple hosts can then be attached to the switch.
802.11 Implementation in NS-2 MAR 2016
 Analyzed the wireless-simple-mac tcl file & calculated various parameters for several scenarios such as Network traffic, Network
throughput from the traces generated for Simple MAC, 802.11 MAC. Analysis of the trace file was done using awk script.
Network Security and Hacking FEB 2016
 Exploited Windows XP machine launching exploits from Metasploitable Linux, Telnet password sniffing & password cracking
using John the Ripper, Used Armitage to automate vulnerability scan & exploit, Simulated SQL Injection, ARP & DNS Spoofing,
Web MITM & Buffer overflow Attacks.
Simulation of Label Switching Network using NS3 tool. FEB 2016
 Implemented and stimulated a network on NS3 tool the using MPLS protocol to show swapping of labels amongst the LSR’s
present in the network.
Implementation of DHCP, DNS, Web Server and Firewall on LINUX NOV 2015
 Designed and implemented a small network by implementing DNS, DHCP, WEBSERVER and FIREWALL on LINUX.

More Related Content

What's hot

IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Dr. Amarjeet Singh
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!edwardo
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)Maarten Mulders
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measureShivam Singh
 
LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1Amanda2345
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Mohamed Loey
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connectionsNitin kumar Gupta
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
 

What's hot (20)

Rushabhraj resume
Rushabhraj resumeRushabhraj resume
Rushabhraj resume
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
50120140507006
5012014050700650120140507006
50120140507006
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 

Similar to Kasturi_Puramwar

Similar to Kasturi_Puramwar (20)

Akshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedIn
 
Wayne Quadros-Resume
Wayne Quadros-ResumeWayne Quadros-Resume
Wayne Quadros-Resume
 
Resume-Sarthak P Shetty
Resume-Sarthak P ShettyResume-Sarthak P Shetty
Resume-Sarthak P Shetty
 
VS_resume
VS_resumeVS_resume
VS_resume
 
Saransh_Burman_Resume
Saransh_Burman_ResumeSaransh_Burman_Resume
Saransh_Burman_Resume
 
main_phase1 _3.pptx
main_phase1 _3.pptxmain_phase1 _3.pptx
main_phase1 _3.pptx
 
TripathiAkriti_resume
TripathiAkriti_resumeTripathiAkriti_resume
TripathiAkriti_resume
 
Vamsi Krishna
Vamsi KrishnaVamsi Krishna
Vamsi Krishna
 
TEJAS NIKAM
TEJAS NIKAMTEJAS NIKAM
TEJAS NIKAM
 
aug-resume-2015
aug-resume-2015aug-resume-2015
aug-resume-2015
 
Najeeb resume sjsu
Najeeb resume sjsuNajeeb resume sjsu
Najeeb resume sjsu
 
Resume
ResumeResume
Resume
 
Rmann
RmannRmann
Rmann
 
Phanidhar Gorrepati
Phanidhar GorrepatiPhanidhar Gorrepati
Phanidhar Gorrepati
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
RESUME_FULLTIME
RESUME_FULLTIMERESUME_FULLTIME
RESUME_FULLTIME
 
Cv hromivchuk
Cv hromivchukCv hromivchuk
Cv hromivchuk
 
rajesh resume edit
rajesh resume editrajesh resume edit
rajesh resume edit
 
Resume_Intern
Resume_InternResume_Intern
Resume_Intern
 
Peter Rubenstein Resume 2016
Peter Rubenstein Resume 2016Peter Rubenstein Resume 2016
Peter Rubenstein Resume 2016
 

Kasturi_Puramwar

  • 1. KASTURI UMAKANT PURAMWAR Email: puramwarkasturi@gmail.com LinkedIn: https://www.linkedin.com/in/kasturipuramwar Cell No. +1 (408) 667 1671 OBJECTIVE: Actively seeking an Internship in field of networking/information-security. EDUCATION: Master of Science in Electrical Engineering (Networking). AUG 2017 San Jose State University, San Jose, CA GPA:3.6 (Internetworking, Network Security, Software Defined Data Centers, Wireless & Mobile networking, Broadband Communication) Bachelor of Engineering, Electronic & Telecommunications JUNE2014 University of Mumbai, India GPA:3.25 (Computer Communication N/W, Optical Fiber Communication, Wireless Communication) WORK EXPERIENCE: Equinix (@ ProUnlimited) – Information Security Intern JUN 2016 – AUG 2016  Performed day to day Information Security operations and tasks on Global Information Security projects which included 2- Factor Authentication, Intrusion Detection Systems, Vulnerability Management, and user support.  Worked in firewall operation support which included managing firewall rules using PaloAlto firewalls. Configuring the firewall for an enterprise network. Handled load balancing operations using the f5 load balancers.  Performed web application scanning and host scanning for vulnerability management. Assist in Information security policy publishing by approving the policies before publishing. Wrote Quick start guides for Web application scanning and how to create a v-wire. Also wrote a bash script for database backup from one server to other. Teaching Assistant - San Jose State University AUG 2016 – DEC 2016  Conduct labs using Matlab, LTspice, and Ipython to solve realistic continuous and discrete time signals, circuits and systems problems. Application to passive and active circuits, to basic control, communications TECHNICAL SKILLS:  Software tools: PSPICE, MATLAB, Artwork PCB, SPJ stimulator, KEIL, Turbo C, Flash Magic, Microsoft Office, Nessus, Splunk, Websense.  Programming languages: Python, ASSEMBLY Language.  Operating Systems: Linux, Windows, Mac, Backtrack Linux, Metasploitable, Kali Linux.  Networking Protocols and Technologies: TCP/IP, UDP, HTTP, ARP, BGP, OSPF, VLAN, DHCP, MPLS, VPN, Wi-Fi, Bluetooth, LTE, 3G/4G, ISIS, RIP, FTP, SNMP, SDN, 802.11, DSR, AODV, DSDV, SSL, IPsec  Networking Tools: Wireshark, Cisco Packet Tracer, NS3, NS2.  Transferable skills: Computing skills, Troubleshooting, Promoting Change, Goal Setting, Problem solving, Public Relations, Improving, Conceptualizing, visualizing concepts, Clarifying problems, Researching. ACADEMIC PROJECTS: Software Defined storage  Used NexentaStor to manage NAS/SAN based primary deployments by creating a Nexentastor environment to create and manage virtual and physical storage devices. Created several volumes and managed those volumes. Created NFS-Share, CIFS share folders and changed their default values and properties, configured CIFS and mounted NFS-share over NS instance. BGP Prefix Hijacking MAY 2016  Implemented a BGP topology using the quagga software routing suite. In prefix hijacking, hijacked a BGP prefix advertised by a router by altering it by another prefix address so that announcement gets directed towards prefix owner. Prefix Hijacking is implemented in a test bed environment provided by Deter labs. Analyzing Honeypot Network (MHN) and Implementing a virtual honeypot MAY 2016  Deployed a Honeypot and analyzed the origin, types, frequency, & IP spoofing of the attacks on the honeypot. We firstly deployed a honeypot using MHN to detect what kind of attacks system is vulnerable to and then made our own virtual honeypot and configured it to trace intruders. Also analyzed honeypots such as Snort, Suricata, Wordpot, Shockpot. Performance analysis of Ad hoc routing protocols MAY 2016  Generated and Analyzed the trace files for AD HOC routing protocols (AODV, DSR, DSDV) using NS2 for various scenarios. Designed python script for creating the traces and developed a parser script in python for calculation of various parameters. Implementation of VLAN’s using open vSwitch MAR 2016  Implemented VLANs within a virtualized network. This is done through an Open vSwitch (OVS) that provides the required virtualization by creating virtual instance of a switch. Multiple hosts can then be attached to the switch. 802.11 Implementation in NS-2 MAR 2016  Analyzed the wireless-simple-mac tcl file & calculated various parameters for several scenarios such as Network traffic, Network throughput from the traces generated for Simple MAC, 802.11 MAC. Analysis of the trace file was done using awk script. Network Security and Hacking FEB 2016  Exploited Windows XP machine launching exploits from Metasploitable Linux, Telnet password sniffing & password cracking using John the Ripper, Used Armitage to automate vulnerability scan & exploit, Simulated SQL Injection, ARP & DNS Spoofing, Web MITM & Buffer overflow Attacks. Simulation of Label Switching Network using NS3 tool. FEB 2016  Implemented and stimulated a network on NS3 tool the using MPLS protocol to show swapping of labels amongst the LSR’s present in the network. Implementation of DHCP, DNS, Web Server and Firewall on LINUX NOV 2015  Designed and implemented a small network by implementing DNS, DHCP, WEBSERVER and FIREWALL on LINUX.