SlideShare a Scribd company logo
PRANAV G ACHARY
Information Security
Analyst
pranavggang@gmail.com
PROFESSIONAL
CERTIFICATION
CISC
Certified Ethical Hacker (CEH)
Education
2013-2018 Bachelor of Engineering-
Computer Science
Truba Institute of Engineering &
Information Technology, Bhopal
CGPA 6.52/10
Technical Skills
Software tools
Network Tools: Nmap, Nessus,
Hping3, Metasploit Framework, Cisco
packet tracer, GNS3, Wireshark.
WEB APPLICATION TOOLS:Burp
suite Pro , Browser Exploitation
Framework (BEEF),Netsparker,SQL
map
ANDROID APPLICATION TOOLS:
Androidstudio,Genymotion,Drozer,
Virtual box, dex2jar,Apk-tool, Apk-
Signer
IOS APPLICATION
TOOLS:MobaXterm, Usbmuxd,Cydia
Impactor
FORENSICS TOOLS:Autopsy,Encase
Forensics imager,Access data Ftk
imager,Andriller
Summary
To work hard with full strength and loyalty in a reputed organization
where my knowledge and skills will bring operational excellence and
optimal growth to the organization and will hone myskills,preparing
me for higher responsibilities..
Core Competencies
Information Security
Operating System: Kali Linux, Windows 7, 8, 10, Windows server 2012.
Cryptography: Encryption, Encoding and Hashing Algorithm.
Understanding of White, Grey and Black Box Pentesting
Good understand of Footprinting, Fingerprinting and Social Engineering
Goodunderstanding ofOSI Model,&TCP/IP
Knowledge of CCNA certification
Good Knowledge and Experience on MS Office Suite.
WEB APPLICATION TESTING
Web Application Testing Framework: Good understanding of OWASP TOP 10 – 2017
Hands-onpracticewith Hackthebox,Vulnhubmachine, CTF365, Bwapp,DVWA,Owasp
juice shop.
ANDROID APPLICATION TESTING
Mobile Application Testing Framework: OWASP Mobile TOP 10 – 2017
Android device rooting, debugging, vulnerability assessment and exploitation.
Hands-onpracticewithAPK&IPAsuchasDVIA,OWASPGoatDroid,Sieve,InsecureBank
etc
IOS APPLICATION TESTING
IOSdevice Jailbreaking, Insecure data storage, Method swizzling, ios runtime
manipulation.
Hands-on practice with Photovault, Ibook, Hacktest etc
FORENSICS
Have Knowledge about Network Forensic, Digital Forensics and Image Forensics
Work Experience
21/01/2019 - Trainee
22/06/2019 Institute of informationSecurity
Performed black, grey and white Box security testing of web
application which involved information gathering, vulnerability
assessment, penetration testing, source code review,mitigating
vulnerability & reporting.
Prepare vulnerability assessment and app testing report
Performed Mobile Application penetration testing manually &
automated: OWASP Mobile TOP 10 -2016

More Related Content

What's hot

Computer security
Computer securityComputer security
Computer security
Mohamed Abdo
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
DATA SECURITY SOLUTIONS
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
Rohitha Liyanagama
 
QR Codes
QR CodesQR Codes
QR Codes
Jonathan Smith
 
Password Cracking using dictionary attacks
Password Cracking using dictionary attacksPassword Cracking using dictionary attacks
Password Cracking using dictionary attacks
lord
 
assign3.docx
assign3.docxassign3.docx
assign3.docx
Captain898
 
Shahee living with-the_ghost-final
Shahee living with-the_ghost-finalShahee living with-the_ghost-final
Shahee living with-the_ghost-final
Bangladesh Network Operators Group
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...
swathi78
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
ecmee
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
CARMEN ALCIVAR
 
Pharming attack
Pharming attackPharming attack
Pharming attack
Akshay Surve
 
rakesh_resume 3
rakesh_resume 3rakesh_resume 3
rakesh_resume 3
Rakesh kumar
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Alert Logic
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
CRAW CYBER SECURITY PVT LTD
 
Axigen cyren v3-web
Axigen cyren v3-webAxigen cyren v3-web
Axigen cyren v3-web
Subrata Hazra
 
4 Precautions to Keep Your Supply Chain Data Safe
4 Precautions to Keep Your Supply Chain Data Safe4 Precautions to Keep Your Supply Chain Data Safe
4 Precautions to Keep Your Supply Chain Data Safe
Alexis Global
 
10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets
SteveBrownNI
 
13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security
Cedar Consulting
 

What's hot (19)

Computer security
Computer securityComputer security
Computer security
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
 
QR Codes
QR CodesQR Codes
QR Codes
 
Password Cracking using dictionary attacks
Password Cracking using dictionary attacksPassword Cracking using dictionary attacks
Password Cracking using dictionary attacks
 
assign3.docx
assign3.docxassign3.docx
assign3.docx
 
Shahee living with-the_ghost-final
Shahee living with-the_ghost-finalShahee living with-the_ghost-final
Shahee living with-the_ghost-final
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
 
Pharming attack
Pharming attackPharming attack
Pharming attack
 
rakesh_resume 3
rakesh_resume 3rakesh_resume 3
rakesh_resume 3
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
Axigen cyren v3-web
Axigen cyren v3-webAxigen cyren v3-web
Axigen cyren v3-web
 
4 Precautions to Keep Your Supply Chain Data Safe
4 Precautions to Keep Your Supply Chain Data Safe4 Precautions to Keep Your Supply Chain Data Safe
4 Precautions to Keep Your Supply Chain Data Safe
 
10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets
 
13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security
 

Similar to Pranav newdigi resume

amresh_updated_exp
amresh_updated_expamresh_updated_exp
amresh_updated_exp
amresh0510
 
Varunsuresh resume
Varunsuresh resumeVarunsuresh resume
Varunsuresh resume
suresh varun
 
TEJAS NIKAM
TEJAS NIKAMTEJAS NIKAM
TEJAS NIKAM
Tejas Nikam
 
PYTHON
PYTHONPYTHON
firozreport.pdf
firozreport.pdffirozreport.pdf
firozreport.pdf
Firozkumar2
 
Ganesh k v my resume
Ganesh k v my resumeGanesh k v my resume
Ganesh k v my resume
Ganesh KV
 
Kushagra bhargava-resume
Kushagra bhargava-resumeKushagra bhargava-resume
Kushagra bhargava-resume
Kushagra Bhargava
 
Abhilash Owk - Resume
Abhilash Owk - ResumeAbhilash Owk - Resume
Abhilash Owk - Resume
abhilashowk
 
Rohan kumar keshri
Rohan kumar keshriRohan kumar keshri
Rohan kumar keshri
rohanrkrohan
 
Kushagra-Bhargava-Resume
Kushagra-Bhargava-ResumeKushagra-Bhargava-Resume
Kushagra-Bhargava-Resume
Kushagra Bhargava
 
Varuns resume
Varuns resumeVaruns resume
Varuns resume
suresh varun
 
Varuns resume
Varuns resumeVaruns resume
Varuns resume
suresh varun
 
Alok ranjan bhoi
Alok ranjan bhoiAlok ranjan bhoi
Alok ranjan bhoi
AlokRanjanBhoi
 
Chetan_patilresume (1)
Chetan_patilresume (1)Chetan_patilresume (1)
Chetan_patilresume (1)
ChEtAn PaTiL
 
Hunlan Lin_resume
Hunlan Lin_resumeHunlan Lin_resume
Hunlan Lin_resume
hunlan lin
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
Splunk
 
Alok Ranjan Bhoi
Alok Ranjan BhoiAlok Ranjan Bhoi
Alok Ranjan Bhoi
AlokRanjanBhoi
 
TEJAS NIKAM
TEJAS NIKAMTEJAS NIKAM
TEJAS NIKAM
Tejas Nikam
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk
 
Splunk Threat Hunting Workshop
Splunk Threat Hunting WorkshopSplunk Threat Hunting Workshop
Splunk Threat Hunting Workshop
Splunk
 

Similar to Pranav newdigi resume (20)

amresh_updated_exp
amresh_updated_expamresh_updated_exp
amresh_updated_exp
 
Varunsuresh resume
Varunsuresh resumeVarunsuresh resume
Varunsuresh resume
 
TEJAS NIKAM
TEJAS NIKAMTEJAS NIKAM
TEJAS NIKAM
 
PYTHON
PYTHONPYTHON
PYTHON
 
firozreport.pdf
firozreport.pdffirozreport.pdf
firozreport.pdf
 
Ganesh k v my resume
Ganesh k v my resumeGanesh k v my resume
Ganesh k v my resume
 
Kushagra bhargava-resume
Kushagra bhargava-resumeKushagra bhargava-resume
Kushagra bhargava-resume
 
Abhilash Owk - Resume
Abhilash Owk - ResumeAbhilash Owk - Resume
Abhilash Owk - Resume
 
Rohan kumar keshri
Rohan kumar keshriRohan kumar keshri
Rohan kumar keshri
 
Kushagra-Bhargava-Resume
Kushagra-Bhargava-ResumeKushagra-Bhargava-Resume
Kushagra-Bhargava-Resume
 
Varuns resume
Varuns resumeVaruns resume
Varuns resume
 
Varuns resume
Varuns resumeVaruns resume
Varuns resume
 
Alok ranjan bhoi
Alok ranjan bhoiAlok ranjan bhoi
Alok ranjan bhoi
 
Chetan_patilresume (1)
Chetan_patilresume (1)Chetan_patilresume (1)
Chetan_patilresume (1)
 
Hunlan Lin_resume
Hunlan Lin_resumeHunlan Lin_resume
Hunlan Lin_resume
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Alok Ranjan Bhoi
Alok Ranjan BhoiAlok Ranjan Bhoi
Alok Ranjan Bhoi
 
TEJAS NIKAM
TEJAS NIKAMTEJAS NIKAM
TEJAS NIKAM
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
 
Splunk Threat Hunting Workshop
Splunk Threat Hunting WorkshopSplunk Threat Hunting Workshop
Splunk Threat Hunting Workshop
 

Recently uploaded

A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
Bruce Bennett
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
Aditya Raghav
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
atwvhyhm
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
yuhofha
 
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
pxyhy
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
taqyea
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
MuhammadWaqasBaloch1
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
2zjra9bn
 
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
pxyhy
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
2zjra9bn
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
SnapJob
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
FauzanHarits1
 

Recently uploaded (20)

A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
 
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
 

Pranav newdigi resume

  • 1. PRANAV G ACHARY Information Security Analyst pranavggang@gmail.com PROFESSIONAL CERTIFICATION CISC Certified Ethical Hacker (CEH) Education 2013-2018 Bachelor of Engineering- Computer Science Truba Institute of Engineering & Information Technology, Bhopal CGPA 6.52/10 Technical Skills Software tools Network Tools: Nmap, Nessus, Hping3, Metasploit Framework, Cisco packet tracer, GNS3, Wireshark. WEB APPLICATION TOOLS:Burp suite Pro , Browser Exploitation Framework (BEEF),Netsparker,SQL map ANDROID APPLICATION TOOLS: Androidstudio,Genymotion,Drozer, Virtual box, dex2jar,Apk-tool, Apk- Signer IOS APPLICATION TOOLS:MobaXterm, Usbmuxd,Cydia Impactor FORENSICS TOOLS:Autopsy,Encase Forensics imager,Access data Ftk imager,Andriller Summary To work hard with full strength and loyalty in a reputed organization where my knowledge and skills will bring operational excellence and optimal growth to the organization and will hone myskills,preparing me for higher responsibilities.. Core Competencies Information Security Operating System: Kali Linux, Windows 7, 8, 10, Windows server 2012. Cryptography: Encryption, Encoding and Hashing Algorithm. Understanding of White, Grey and Black Box Pentesting Good understand of Footprinting, Fingerprinting and Social Engineering Goodunderstanding ofOSI Model,&TCP/IP Knowledge of CCNA certification Good Knowledge and Experience on MS Office Suite. WEB APPLICATION TESTING Web Application Testing Framework: Good understanding of OWASP TOP 10 – 2017 Hands-onpracticewith Hackthebox,Vulnhubmachine, CTF365, Bwapp,DVWA,Owasp juice shop. ANDROID APPLICATION TESTING Mobile Application Testing Framework: OWASP Mobile TOP 10 – 2017 Android device rooting, debugging, vulnerability assessment and exploitation. Hands-onpracticewithAPK&IPAsuchasDVIA,OWASPGoatDroid,Sieve,InsecureBank etc IOS APPLICATION TESTING IOSdevice Jailbreaking, Insecure data storage, Method swizzling, ios runtime manipulation. Hands-on practice with Photovault, Ibook, Hacktest etc FORENSICS Have Knowledge about Network Forensic, Digital Forensics and Image Forensics Work Experience 21/01/2019 - Trainee 22/06/2019 Institute of informationSecurity Performed black, grey and white Box security testing of web application which involved information gathering, vulnerability assessment, penetration testing, source code review,mitigating vulnerability & reporting. Prepare vulnerability assessment and app testing report Performed Mobile Application penetration testing manually & automated: OWASP Mobile TOP 10 -2016