San Francisco, California, United States
8K followers 500+ connections

Join to view profile

About

🔊 All views expressed in my posts/talks/podcasts are my own and DO NOT represent my…

Activity

Join now to see all activity

Experience & Education

  • Zipline

View Kalyani’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Courses

  • Critical Infrastructure Protection

    EN.650.621.

  • Cryptography and Coding

    -

  • Cyber Risk Management

    -

  • Ethical Hacking

    -

  • Global Cybersecurity Trends and Practices

    EN.650.681.

  • Law and The Internet

    -

  • Network Security

    -

  • Security and Privacy in Computing

    EN.601.643.

  • Software Vulnerability Anlysis

    EN.650.660.

Projects

  • Case Study: Spectre, CVE-2017-5715

    Analyzed the two variants of Spectre Attack, the kind of vulnerabilities found in the target machine and how it can be avoided. The exploit was performed and patched.

  • Study of NIST Cybersecurity Framework

    Performing a detailed analysis of every category and subcategory of the NIST framework 1.1

  • Threat Modelling on open source web application, GNU Med

    Threat Modeling of an open source application done using Microsoft Threat Modeling tool 2016.

  • Intranet mail server system

    To develop an Intranet web-based mail client system connecting to a server with purpose to implement the necessary functionalities to the users such as receiving and organizing mails through IMAP and POP as well as Sending mails by SMTP.

  • Case Study: Buffer overflow in FreeBSD 7.3, CVE 2011-4862

    -

    Found vulnerability in telnet (specifically in libtelnet/encrypt.c),
    The exploit was performed and later on fixed by making changes to the vulnerable function.

  • Exploitation of a Custom Ubuntu machine (SEED VM)

    -

    Performed various memory corruption and privilege escalation exploits like Buffer Overflow, return to Libc, Format String arbitrary read/write, Shellshock Attack, Race condition, and Dirty COW vulnerability. Attack on TCP Protocol, Firewalls, and DNS Server and launched a Heartbleed attack. Implemented XSS, CSRF and SQL Injection.

  • Penetration Testing on Vulnerable Web Application

    -

    Performed full blown pen testing (bWAPP and DVWA) on an unknown open source application to get hands-on experience on OWASP Top 10. Identified the app as net-toe and reviewed it to find
    more vulnerabilities.

  • Threat Prediction in a SCADA system

    -

    Developed a Fuzzy Inference System(a fuzzifier and a defuzzifier in C++) and a Deep Learning Model(using WEKA tool) to monitor HMI/RTU packets and detect threats with varying levels of certainty.

  • Reverse Engineering on a few open-source web applications

    -

    Prepared leak, read, and write exploit on an application, Zork.
    Used SciTools Understand to analyze a gaming application, Cross-fire, employed Hexinator and developed a python program to parse the binary and print the headers

  • Active and Passive FTP and Security Analysis

    -

    The designs of the protocols, which include the TCP connection establishment on the respective ports, are verified using live practical analysis with wire-shark protocol analyzer.

Honors & Awards

  • RSAC Security Scholar

    -

  • Women In CyberSecurity Scholarship 2019

    WiCyS

Languages

  • Marathi

    Native or bilingual proficiency

  • English

    -

  • Hindi

    -

  • Spanish

    Elementary proficiency

Recommendations received

2 people have recommended Kalyani

Join now to view

More activity by Kalyani

View Kalyani’s full profile

  • See who you know in common
  • Get introduced
  • Contact Kalyani directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content