Ragavendra Prasanna P.K

Digital Forensic Analyst | Cybersecurity Professional

Get In Touch

About Me

🛡️

I am a motivated and detail-oriented graduate in Cyber Forensics and Information Security with hands-on experience in security tools and networking fundamentals. With professional experience as a Digital Forensic Analyst at FDI LABS, I have collaborated with government agencies including the Income Tax Department and Enforcement Directorate during raids to identify, extract, and preserve digital evidence.

My expertise spans digital forensics, vulnerability assessment, penetration testing, and incident response. I have utilized advanced forensic tools like FTK Imager, Autopsy, and various steganography tools for comprehensive data acquisition and analysis. I maintain strong analytical skills and am committed to protecting digital infrastructures through continuous learning and professional excellence.

Currently pursuing advanced cybersecurity training with GenAI through NIIT, I stay current with emerging threats and cutting-edge defensive strategies. I am passionate about handling real-world digital investigations and contributing to the cybersecurity community.

Certifications & Training

🎓

Certified Cybersecurity Specialist

NIIT (powered by StackRoute)
Successfully completed the Cybersecurity with GenAI Advanced Program
Date: March 29, 2025 | Duration: June 27, 2024 - October 24, 2024

🔒

Internship in Cyber Security

Ozone Cyber Security, Tiruchirappalli
Certificate of Attendance - Internship Program
Date: December 23, 2020 | Duration: January 1, 2020 - December 23, 2020
Certificate No: 0223122008

💼

Introduction to Careers in Cybersecurity

Cybrary
1 CEU/CPE and 2 hours of training
Date: November 20, 2024
Certificate No: CC-11463867-0c1a-400c-8c5f-128d47e878f8

☁️

Cloud Governance Principles

Cybrary
1 CEU/CPE and 1 hour of training
Date: November 12, 2020
Certificate No: CC-4a89ccdd-8d86-4497-8cb8-6e057097a94f

🌟

Welcome to Cybrary

Cybrary
0 CEUs/CPEs and 1 hour of training
Date: November 12, 2020
Certificate No: CC-03618202-6213-4c60-9b2f-cc6b17916f52

Skills & Expertise

Digital Forensics

FTK Imager Autopsy Recuva Disk Imaging Hash Verification Chain of Custody Steganography

Penetration Testing

Nmap Wireshark Burp Suite Metasploit Hydra John the Ripper SQLmap Social Engineering

Security & Monitoring

Wazuh SIEM Splunk OpenVAS Vulnerability Assessment Threat Hunting Incident Response Log Analysis

Frameworks & Cloud

OWASP Top 10 MITRE ATT&CK NIST Framework ISO 27001 AWS Security Azure Security GCP Security Compliance & Auditing

Programming & Scripting

My Programming Journey Bash Scripting PowerShell Security Automation

Network & Infrastructure

TCP/IP DNS Security Firewall Management IDS/IPS VPN Configuration Network Analysis Packet Capture

Featured Projects

InvisiText: Steganography Tool

InvisiText is a Python-based steganography tool that allows you to seamlessly hide secret messages within images using the Least Significant Bit (LSB) technique. It provides an intuitive graphical interface for encoding and decoding hidden data, ensuring minimal visual alteration to the carrier images.

Python Steganography Cryptography GUI Image Processing

Enhanced Security System (Pattern-Based Authentication)

A pattern-based password authentication scheme developed to overcome vulnerabilities of traditional textual passwords, such as shoulder surfing attacks. The user registers a pattern and then logs in by entering textual passwords in a specific order based on that pattern. The password grid is mutated with random characters at every login, enhancing security and making it difficult to compromise.

Authentication Cybersecurity Pattern Recognition User Interface Vulnerability Mitigation

My Cybersecurity Lab

Lab Environment Overview

My personal cybersecurity lab serves as a controlled environment for security research, vulnerability testing, and skill development. The lab includes multiple virtualized networks, threat simulation capabilities, and comprehensive monitoring systems.

Key Features:

  • Isolated network segments for safe testing
  • Multiple operating systems and vulnerable applications
  • Real-time threat monitoring and analysis
  • Automated malware analysis sandbox
  • Digital forensics workstation with specialized tools
  • Penetration testing arsenal and custom scripts

Research & Development

Continuous research into emerging threats, attack vectors, and defensive strategies. Regular participation in CTF competitions and vulnerability research programs.

Current Research Areas:

  • AI-powered threat detection and response
  • Advanced persistent threat (APT) analysis
  • Zero-day vulnerability research
  • Blockchain and cryptocurrency forensics
  • IoT security and embedded systems
  • Mobile device forensics and security

🔒 My Cybersecurity Lab – SOC Simulation

I have built a virtual SOC environment where I can practice both defensive (Blue Team) and offensive (Red Team) security skills, with planned upgrades to simulate real-world cybersecurity operations.

🟦 Blue Team (Defensive Tools & Monitoring)

These tools and setups defend, monitor, and respond to threats in my lab:

  • pfSense Firewall (Network Perimeter Defense)
    • Acts as the gateway between attacker machines and internal lab network
    • Configured with WAN/LAN segmentation, NAT, and firewall rules
    • Protects against unauthorized access
  • Wazuh SIEM (Ubuntu Server – 10.10.10.52)
    • Centralized log collection, correlation, and alerting
    • Connected agents on Windows Server and Windows 10 endpoint
    • Detects anomalies, malware, brute force, and privilege escalation
  • Windows Server 2019 (AD, DNS, DHCP)
    • Acts as Active Directory domain controller
    • Provides user authentication, policies, DNS, and DHCP
    • Logs forwarded to Wazuh for monitoring user logins, GPO changes
  • Windows 10 Client (AD-joined workstation)
    • Acts as an endpoint monitored by Wazuh
    • Simulates a corporate user machine targeted by attacks
    • Collects logs for incident detection and response

🔴 Red Team (Offensive Tools & Testing)

These simulate attacker techniques to test the defensive setup:

  • Nmap – Network scanning, host discovery, service enumeration
  • Metasploit – Exploit delivery, payload execution, privilege escalation
  • Aircrack-ng – Wireless password cracking (for Wi-Fi testing)
  • Hydra / Brute Force Scripts – Password spraying and brute force
  • Kali Linux Tools – Phishing kits, exploitation, web app attacks (SQLi, XSS)

This allows me to simulate real-world attack scenarios against my lab and measure how the Blue Team tools detect and respond.

🚀 Future Concepts (Planned Additions)

I am expanding my lab to replicate a full SOC workflow, including ticketing and VAPT practice.

  • IDS/IPS (Snort or Suricata)
    • Network-based intrusion detection/prevention
    • Detects malicious traffic in real time
    • Complements Wazuh SIEM alerts
  • Honeypots (Cowrie, Dionaea, Honeyd)
    • Decoy systems that trap attackers
    • Collect threat intelligence by logging their actions
  • VAPT Lab (Penetration Testing Simulation)
    • Vulnerability Assessment & Penetration Testing projects
    • Learn core hacking methodologies in a safe environment
  • Ticketing System (TheHive / MISP Integration)
    • SOC-style incident tracking and response
    • Connects Wazuh alerts → creates tickets → manage lifecycle
  • Core Hacking Studies
    • Malware analysis, exploit development
    • MITRE ATT&CK simulation to cover red vs. blue scenarios

Security Tools Arsenal

Digital Forensics

  • FTK Imager & Forensic Toolkit
  • Autopsy Digital Forensics Platform
  • Volatility Memory Analysis
  • Sleuth Kit & Timeline Analysis
  • Recuva & PhotoRec Recovery
  • Hex Workshop & HxD

Penetration Testing

  • Kali Linux & Parrot Security OS
  • Metasploit Framework
  • Burp Suite Professional
  • Nmap Network Discovery
  • Wireshark Protocol Analyzer
  • John the Ripper & Hashcat

SIEM & Monitoring

  • Wazuh SIEM Platform
  • Splunk Enterprise Security
  • ELK Stack (Elasticsearch, Logstash, Kibana)
  • OSSEC Host-based IDS
  • Snort Network IDS
  • Nagios Network Monitoring

Get In Touch

Ready to collaborate on cybersecurity projects or discuss digital forensics challenges? I'm always open to connecting with fellow security professionals, researchers, and organizations seeking expertise in digital investigations and threat analysis. For any inquiries, please use the form below.