CarolinaCon Online 4

CarolinaCon Online 4

The speaker’s profile picture
Ankit Giri

Entrepreneur, presenter, and a blogger, Ankit has a diverse background in writing informational blogs. A penetration tester by profession with 10+ years of experience and a security enthusiast by heart. Part time bug bounty hunter. Featured in Hall of fame of EFF,GM,SONY, HTC, Pagerduty, HTC, AT&T,Mobikwik and with multiple other Hall Of Fames. He loves speaking in conferences, has been a feature at TestTribe Calsoft 2024, Cyber Security Asia 2022, TestFlix 2021, COCON 2021, RedTeam Security Summit 2020, The Hackers Meetup 2020, AWS Community Day 2020, DeepSec Austria 2019, BSides Ahemdabad 2019, RSA APAC 2018, BSides Delhi 2017, CSA, Dehradun,Cyber Square Summit, OWASP Jaipur and has been a regular feature at Infosec meetups like Null and OWASP Delhi Chapter, TestTribe and Peerlyst meetups. He had presented his research on the following topics:

Strengthening Supply Chain Security: A DevSecOps Perspective

Mastering AWS Pentesting and Methodology

Cloud Security & Best Practices in AWS,

Ineluctable weakness of logical vulnerabilities

Pwning Windows Mobile Applications,

IoT Security Risks & Challenges,

Application of Machine Learning in Criminal Profiling,

Pentesting Mobile Applications.

Ankit has also taken hands-on session on Securing AWS environments at null Bachaav.

He has taken guest lectures in getting started with AWS, and Mobile computing at Fore School of Management.

Recently presented guest lecture on "Ineluctable weakness of logical vulnerabilities" at IIT Roorkee, Online Summer Training Program on Ethical Hacking and Cyber Security.
Another guest lecture at The Department of Information Technology of NIT, Online One Week International Webinar Series on Top Trending Technologies in the World.

He has published article in PenTest magzine on IoT security. He has been a featured profile at Peerlyst.

  • Strengthening Supply Chain Security: A DevSecOps Perspective
The speaker’s profile picture
Aryan Jogia

Aryan is a security researcher with over 3+ years of experience. He’s a full time malware developer and loves to evade AV and EDRs. His research interests are not just limited to Windows, but he even develops low level code for *nix systems. Even though his expertise lies in the domain of malware developer and reversing, he also dabbles in the domain of red teaming. With his experience in low level programming, he also curates and develops toolkits extensively used for red team engagements. With his CRTO certification in tow, he has led and participated in numerous red team engagements with strong defense mechanisms.

  • Playing the game of tag with modern day AV and EDRs: A guide to evading the watchdogs.
The speaker’s profile picture
Chetanya Kunndra

Chetanya Kunndra is a security researcher with over 3+ years of experience. His major area of expertise lies within the domain of pentesting and red teaming. Apart from red teaming, he has a knack for developing automation toolkits. He often dabbles with malware development and reverse engineering. With this knowledge he has been successfully able to evade sophisticated defenses in numerous red teaming exercises. He has published several researches in the domain of application of artificial intelligence in cyber security. He has received his Masters of Technology in the domain of Cyber Security and also holds the CRTO certification.

  • Playing the game of tag with modern day AV and EDRs: A guide to evading the watchdogs.
The speaker’s profile picture
Giriraj Ravichandran

I am Giriraj R, currently serving as a Security Engineer, RedTeamOps/AI @Freshworks, OSWE, EJPT, Rastalabs HTB, and CTF Player @TamilCTF. In my current role, I specialize in implementing automated solutions at an enterprise-wide level and am a Purple Teamer. I have garnered substantial recognition through my active participation and victories in numerous Capture The Flag (CTF) competitions, adopting the moniker 'Cipherlover' and collaborating with the distinguished CTF team 'TamilCTF.' My profound insights extend to Purple Teaming, cloud security, and the operational aspects of the Security Operations Center (SOC). With a passion for cybersecurity, I'm committed to fortifying digital landscapes and continuously expanding my knowledge.

LinkedIn - https://www.linkedin.com/in/giriraj-r-2a059b21a/

  • The Dark Side of Installers: Security Flaws in macOS and Windows
The speaker’s profile picture
Jeffrey Bell

My name is Jeffrey Bell, I am a Senior InfoSec Analyst and Threat Intelligence Lead at Norstella. I graduated from UNC-Charlotte with a B.S. in Computer Science specializing in Cybersecurity. When not working, I write for my blog catchingphish.com and enjoy skiing!

  • Repercussions from the Absence of Threat Actor Taxonomy
The speaker’s profile picture
Mark El-Khoury

Mark started as an offensive security consultant, doing penetration testing and code and design reviews. Mark then expanded his skillset into the defensive side, leading cybersecurity at various organizations and industries, including: Gaming, fintech, and biometrics. Mark is a conference speaker, holds security certifications, and was an instructor at a Columbia University cybersecurity bootcamp for over four years. Mark is now Director of Security Engineering at Movable Ink.

  • Explosive overflow: Lessons from rocket science
The speaker’s profile picture
Muhammad Shahmeer

Shahmeer Amir stands as a globally recognized Entrepreneur, world renowned public speaker and Ethical Hacker, awarded Entrepreneur of the year 2024 for founding multiple startups including Speeqr and also ranking as the third most accomplished bug hunter globally. Shahmeer has been invited to speak at 130 international conferences including Black hat, DefCON, GiSec, National Security Summit, One Conference, International Cyber Security Forum And many others.

His expertise has been instrumental in assisting over 400 Fortune companies, such as Facebook, Microsoft, Yahoo, and Twitter, in resolving critical security issues within their systems. Shahmeer's entrepreneurial ventures in the technology realm have led to the establishment of multiple startups, with his current role involving the leadership of Speeqr, and involvement in Veiliux and Authiun.

In his capacity as the CEO and CTO of Speeqr, Shahmeer's flagship company is actively engaged in developing next-generation audio-video communication technologies. Additionally, he serves as the CEO of Veiliux, positioned as Asia's inaugural mainstream Cyber Security startup with a presence in the Asia Pacific, UAE, and the UK. Authiun, another startup under Shahmeer's leadership, offers a comprehensive password-less authentication solution tailored for the 21st century. And Dark which is a consumer centric privacy solution.

Furthermore, Shahmeer serves as the Cyber Security Advisor to the Ministry of Finance in the Government of Pakistan. His involvement spans various projects, including Deep Sea Tracking, Digital Transformation of Legislation, and the Digitization of Pakistani Cultural Content. As a testament to his influence in the tech industry, he holds a position on the Forbes Technology Council.

Shahmeer is a valedictorian from EC Council University, a Top achiever from UIT and recently Ph.D Doctor currently perusing second Ph.D in Space Cyber Security. Accepted into entrepreneurship programs at esteemed academic institutions, including Stanford, Shahmeer's prowess is further demonstrated by his proficiency in coding in 25 languages and reading code in 35, establishing him as an expert across multiple technologies in his role as CTO of companies.

An Engineer and certified Cyber Security professional with credentials from esteemed organizations. With three authored books, including "Bug Bounty Hunting Essentials," and numerous research papers, he has solidified his standing as a thought leader in the field.

  • Hack the Sky: Exploring Satellite Vulnerabilities and Cyber Threats
The speaker’s profile picture
Parker Garrison

Parker Garrison has consistently finished 1st in various CTFs, including a previous year's CarolinaCon CTF, and presented at conferences such as DerbyCon, where he gave a live demonstration of exploit development and bypassing exploit mitigations. He has professional experience in the private and public sectors, as well as an independent consultant.

  • "A Shell? In the HTTP Server response factory? Ok I guess we doin' shells now:" Creating a Secure Web Server from Two Vulnerable Web Servers (Live Exploit Demos!)