About
Articles by Shubham
-
How to boot linux iso without usb on corrupted bios of lenovo laptops
How to boot linux iso without usb on corrupted bios of lenovo laptops
By Shubham Dubey
-
Completed online certification for Social Engineering and Manipulation
Completed online certification for Social Engineering and Manipulation
By Shubham Dubey
Activity
-
A newly detailed speculative attack vulnerability could leave devices using Arm CPUs more vulnerable to attack. #cybersecurity #infosec #ITsecurity
A newly detailed speculative attack vulnerability could leave devices using Arm CPUs more vulnerable to attack. #cybersecurity #infosec #ITsecurity
Liked by Shubham Dubey
-
As the security backlash has grown against Microsoft's Recall feature, it at least seemed the screenshots it silently takes every 5 seconds are…
As the security backlash has grown against Microsoft's Recall feature, it at least seemed the screenshots it silently takes every 5 seconds are…
Liked by Shubham Dubey
Experience & Education
Licenses & Certifications
Publications
-
Summary of Linux kernel security protections and attack
AVAR 2022
Presented paper on Summary of linux kernel security protections and attacks in AVAR(Association of anti Virus Asia Researchers) 2022.
-
Everything you need to know about Linux Containers (LXC)
OpenSource for U magazine
Containers are the future when it comes to using and shipping applications. But Linux containers or LXC can be used for more than just that. This article covers the use of LXC on a daily basis as well as for production.
-
Network Performance Monitoring and Tuning in Linux
OpenSourceForU
Networking performance tuning is challenging as compare to other areas of tuning due to requirement of deep knowledge about how network data transmission works in linux. In this article I have tried to explain how data transmission work in linux, possible bottleneck of network and how to tuned them for better performance.You can view the article at below link:
https://drive.google.com/file/d/0BzHRhQXSJX2ZcHY3aHlCQm9QTU0/view?usp=sharing -
The Many Approaches to Sandboxing in Linux
Open source for U
You can isolate malicious programs or risky tasks by sandboxing them in different ways
to stop them from affecting your main system. This article gives the reader a working
knowledge of sandboxing in Linux.
You can view or download the article from here:
https://drive.google.com/file/d/0BzHRhQXSJX2ZM3M5aS1qQ2s3V2M/view?usp=sharing -
Manage File Storage to Give the Best Costumer Service
Open source for U
Article on how to use File storage as storage solution for cloud service provider using Sparse file.The preview of article can be viewed here.
https://drive.google.com/file/d/0BzHRhQXSJX2ZUm9iQVdVdlg4eEpxUDRjRWNmWG03Qi1EcHBr/view?usp=sharing
Courses
-
RHCE v6
00050062005
-
RHCE v7
00050062005
-
Red Hat Openstack Adminstration
00050062033
Projects
-
Firmfini - Runtime firmware threat detection toolkit
We're developing a product to cater Firmware & Kernel security protection needs for Endpoints and servers Infrastructure, focusing on sophisticated threats detection & prevention on core.
The product will be able to monitor and protect multiple components present at ring 0 to -3 from malicious threats.
The product core is based on the fact that to access any low level kernel or firmware components(lower or equal to ring 0) the code will be execute in ring 0 only in form of kernel…We're developing a product to cater Firmware & Kernel security protection needs for Endpoints and servers Infrastructure, focusing on sophisticated threats detection & prevention on core.
The product will be able to monitor and protect multiple components present at ring 0 to -3 from malicious threats.
The product core is based on the fact that to access any low level kernel or firmware components(lower or equal to ring 0) the code will be execute in ring 0 only in form of kernel module.
If we can monitor all the calls that are responsible for firmware and important kernel modification using kind of callback than we can easily build an intelligent system based on this.
Since Linux kernel provide multiple powerful inbuilt features to control and monitor the kernel flow, developing such solution is effortless.
The detection will be based on series of event triggered one after another. -
Memfini
-
A Systemwide memory related events monitoring interface for linux.
Memfini is capable of monitoring memory allocations on User space, Kernel space as well as some under looked allocations like PCI device mapping etc. It provides a command line interface with multiple filters, allowing a user to interact with the logs generated & get the required data. Currently, the user will be able to filter the events by individual process, type of access etc.Other creatorsSee project -
SymBlock
-
A unique windows kernel driver to protect your system from privilege escalation due to symbolic link exploits.
-
Hypervisor from scratch
-
A hypervisor for virtual environment written from scratch in C and Inline assembly as linux kernel module.
-
MBR extractor
-
A python based toolset to extract and analysis the MBR (Master Boot Record) data.
Capabilities include checking for a valid MBR sector, parsing the partition table entries, dumping the raw MBR. -
Analysis and Exploiting Windows and Linux security
-
This ongoing project covers a security comparison between linux and windows on basis of different functionality and features
Other creatorsSee project -
SmartClass Web Application
-
A Python Django Framework based web application for student and teachers online interaction. This application help for resource sharing, Notification, Online cheacking and many more.
Other creatorsSee project -
np-scanner
-
A lightweight network/port scanner built in python having feature like multiple ips scan,whole network scan and saving output to a file and many more.
-
XML Remote Connector
-
XML Remote Connector is a remote server client application that can use for doing any simple task in remote server which is listening for some connection. XML Remote Connector is developed in Python using SimpleXMLRPCServer and xmlrpclib. The idea behind creating this program is that there is no popular tool that can give remote control on other system for executing commands with transferring file in parallel and also to send message.Although netcat is there for this but is none of them can be…
XML Remote Connector is a remote server client application that can use for doing any simple task in remote server which is listening for some connection. XML Remote Connector is developed in Python using SimpleXMLRPCServer and xmlrpclib. The idea behind creating this program is that there is no popular tool that can give remote control on other system for executing commands with transferring file in parallel and also to send message.Although netcat is there for this but is none of them can be done at once and is not very user friendly.So,here is this tool through which you can exec commands, send encrypted messages and tranferring file at same.
-
Automate Deployment of Cloud Computing and Virtualization on linux system with advance python
-
Creating of own cloud architect which include IAAS ,SAAS and STAAS services.Which can be provided through browser and have involvement of docker and iscsi like technology.
-
Hash cracking tool
-
A simple Hash cracking linux based tool that find the correct hash value by dictionary attack.It support most of the common algorithm (md5,sha1,sha224,sha256,sha384,blowfish,sha512).It also supports salted hash value and also able to create hash from any given word.
Honors & Awards
-
IITK Cyber Security Hackathon
IIT Kanpur
Won 3rd prize in the Cybersecurity Startup Challenge of HCL HACK IITK 2021
Languages
-
English
-
More activity by Shubham
-
Got the opportunity to attend #bluehatindia (supposedly a top-tier security conference for researchers) few days back. Compared to other equivalent…
Got the opportunity to attend #bluehatindia (supposedly a top-tier security conference for researchers) few days back. Compared to other equivalent…
Posted by Shubham Dubey
-
Last October, Taylor Beebe (Microsoft) led the UEFI Fall 2023 Developers Conference & Plugfest, session “Hardening the Core: Enhanced Memory…
Last October, Taylor Beebe (Microsoft) led the UEFI Fall 2023 Developers Conference & Plugfest, session “Hardening the Core: Enhanced Memory…
Liked by Shubham Dubey
-
EMS is a a remarkable yet often overlooked feature that's been available in all Windows versions for some time now. Below is a quick guide on how to…
EMS is a a remarkable yet often overlooked feature that's been available in all Windows versions for some time now. Below is a quick guide on how to…
Shared by Shubham Dubey
-
The tool I developed to analyze malicious OneNote documents - "OneNoteAnalyzer" is now a part of the Flare VM. Check it out! ✌ Flare VM:…
The tool I developed to analyze malicious OneNote documents - "OneNoteAnalyzer" is now a part of the Flare VM. Check it out! ✌ Flare VM:…
Liked by Shubham Dubey
-
A great blog post around how Tetragon could have detected the famous XZ Utils CVE 2024-3094 Exploit. For anyone following along, last week a backdoor…
A great blog post around how Tetragon could have detected the famous XZ Utils CVE 2024-3094 Exploit. For anyone following along, last week a backdoor…
Liked by Shubham Dubey
-
Another day, another side-channel attack... I have to admit that side-channel attacks are among some of my favorite ways to compromise any system…
Another day, another side-channel attack... I have to admit that side-channel attacks are among some of my favorite ways to compromise any system…
Liked by Shubham Dubey
-
#FTC charged #Avast with selling users' browsing data to advertising companies https://lnkd.in/dciARE6K #securityaffairs #hacking
#FTC charged #Avast with selling users' browsing data to advertising companies https://lnkd.in/dciARE6K #securityaffairs #hacking
Liked by Shubham Dubey
-
Signal is rolling out new settings today to finally let you create a username instead of revealing your phone number to everyone you communicate…
Signal is rolling out new settings today to finally let you create a username instead of revealing your phone number to everyone you communicate…
Liked by Shubham Dubey
-
💥#LogoFAIL PoC: Binarly researchers show the dangers of firmware parsing bugs by developing a PoC on a real device with modern firmware security…
💥#LogoFAIL PoC: Binarly researchers show the dangers of firmware parsing bugs by developing a PoC on a real device with modern firmware security…
Liked by Shubham Dubey
-
🧚🏽♂️ PixieFail : Yet another story of vulnerabilities in UEFI. Supply chain vulnerabilities are not dead… Last year, our security researchers…
🧚🏽♂️ PixieFail : Yet another story of vulnerabilities in UEFI. Supply chain vulnerabilities are not dead… Last year, our security researchers…
Liked by Shubham Dubey
-
Releasing a piece of research that had been awaiting completion since the previous year. An attempt to document the complete evaluation of memory…
Releasing a piece of research that had been awaiting completion since the previous year. An attempt to document the complete evaluation of memory…
Shared by Shubham Dubey
Other similar profiles
-
Elena Doron
Connect -
Kasif Dekel
Connect -
Hrudaya Vikasa
Security Researcher @ McAfee | Reverse Engineering | Malware R&D | AV/EDR Evasion | Exploit Development | Active Directory Pentesting | Red Team | Adversary Emulation
Connect -
Sarthak Misraa
Connect -
Arpita Babar
MDR security Analyst | CEH
Connect -
LAKSHYA MATHUR
Security Researcher at McAfee
Connect -
Niraj S
Connect -
Unni Krishnan Ganapathy
Connect -
Mitesh Wani
Connect -
Shivam Trivedi
Cyber security researcher
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Shubham Dubey in India
-
Shubham Dubey
-
Shubham Dubey
-
Shubham Dubey
Analytics @ MAF-Carrefour || 7+ years of Analytics & Consulting experience || ex-Bain & Company, Nielsen, Evalueserve
-
Shubham Dubey
Recruitment Consultant | Recruiting Business Service Professionals For Professional Services Firms
-
Shubham Dubey
1883 others named Shubham Dubey in India are on LinkedIn
See others named Shubham Dubey