M.S., Computer Science, Stony Brook University (February 2021-Present)
Working for File systems & Storage Lab(FSL) on the Logic Model Checking of File Systems project.
B.Engg, Information Technology, Pune Institute of Computer Technology, India (August 2014-June 2018) [CGPA: 9.2/10]
RackWare Technologies, Software Engineer (July 2018- January 2021)
Import Export Feature for Images (May 2019 to October 2019)
Designed and developed a feature to allow exporting of "captured" images of Virtual Machines into a tar, and importing these images on another RMM, in order to use them for deployment and migrations.
Technologies used were C++, Python, ZFS send/receive, ZFS snapshotting, tar, md5sum.
RackWare Selective File Back Up and Restore (July 2020 to September 2020)
As a part of this feature, a user can have multiple backups (versions) of a particular virtual machine and restore specific files/directories to a particular version at a custom location/original location. Worked on applying attributes to the restored files/directories/symlinks. This was done for both Linux and Windows environments.
Technologies user were C++(Boost library, MSDN's fileapi.h), Shell Scripting and ZFS snapshotting
RackWare RMM Installer Revamp (October 2020 to December 2020)
Revamped the self-extracting installer to make it partially unattended. This was done by reducing the number of the user inputs by performing validations, identifying dependencies on current configuration before taking a user input in an upgrade scenario.
Technologies: Make Self - self extracting archive, Shell Scripting .
Worked on designing and developing a password storage and authentication provider based on FreeBSD. It is capable of storing credentials and X.509 certificates for various Open Source Applications in an encrypted database.
Integrated the provider with Apache HTTP Server by creating a custom module. Developed using Advanced C, Sodium Cryptographic Library, MySQL.
Plug Board Proxy(April 2021- May 2021)
Developed a utility using Go that acts as a plug board proxy for adding an extra layer of protection to publicly accessible network services which can act in client mode as well as reverse-proxy mode. The data is encrypted using AES-256 in GCM mode.
DNS Poisoning Tool and Network Traffic Sniffer (February 2021-March 2021)
Developed a utility using Go that can capture the traffic from a network interface in promiscuous mode and can inject forged responses to selected DNS requests with the goal of poisoning the cache of the victim’s resolver.
Android App and Web Application Development (May 2017-June 2017)
Programming Languages: C++ (5 years), C (5 years), Python (4 years), Shell Scripting (3 years), Go ( <1 year)
Technologies: Git, ZFS, Google Protobufs, REST APIs.