Test
Hi! Welcome to my personal page. I'd like to show my work to people around the world. It's a big oportunity to do a better work too.
I love analysis and security research in everything. Actually, I'd like to find the vulnerabilities in all of applications and protocols, in fact the ways to influence. Feel free to take a look around our site, take a look.
I believe the below sentence :
There are always things to learn.
Qualification: Bachelor of Science
Qualification: Cisco Certified Network Associate (CCNA)
Certification NO. 91-07-2325
Qualification: Associate's degree
Detailed study of RFC 2328 (OSPF v2). Research on the known OSPF vulnerabilities and known methods and new methods of attacks on OSPF traffic.
Use my tool for cleaning and disinfecting PE files (*.exe and *.dll) that infected by Ramnit.H malware.
This tool is just for disinfecting of infected files, not be used for thorough cleaning infected systems.
My tutorial is about the disinfecting of Alman.NAB (ESET NOD32 AV) from an infected file with example and full details.
SCADA System Vulnerabilities to Cyber Attack.
Capable of handling all layer 2 attacks/defense and other layers, router hardening, security at routing protocols such as OSPF,BGP,RIP. Familiar with TOR network, Onion Routing and user anonymity. Able to implement different attacks in network and develop new tools for different/new attacks when necessary.
Able to code custom tools and scripts related to databases, RCE and network using Delphi, Assembly and Python and using SCAPY, Sulley, PyDBG and other modules in python.
Analyze cryptography methods like RSA and AES used in packet encryption in malwares. also able to analyze custom cryptography functions like custom XOR.
Experience in handling different file formats like ZIP, DOC, DOCX, JPG, etc. and also able to analyze memory dumps for malwares and vulnerabilities.
Analyze different type of malwares and find out custom methods they are using on Windows, Android. Analyze vulnerabilities in binary files.
My Article is about Buffer Overflow bug and how to exploit it,
Also this paper describes some problem and technique in exploiting.
Private Publication : 27/1/2010
Public Publication : 31/8/2013
Oral presentation in sixth e-business system conference held by Amirkabir University of Technology (Tehran Polytechnic). Accepted as a best paper at Network Security & Cyber Passive Defense panel.
Oral presentation in the 16th Conference of National Association of Electrical Engineering.
Oral presentation in the first National Conference on Emerging Trends in Engineering and Computer Retrieval of Information.
Indexed by Civilica.
Oral presentation in the Conference of 8th Symposium on Advances in Science & Technology -8th SASTech 2013 ( CNMSecur ).
Selected Article and Accepted Paper about Security In Cloud Computing in the Information Technology Conference of Tabarestan University.
Published in JEEE journal, Journal of Electrical and Electronic Engineering.
Published in System and Application Security conference aka SoftSec held by University of Shiraz.
Oral presentation in seventh e-business system conference held by Amirkabir University of Technology. It's about software exploiting in two modes on MS-Windows family OS (user-mode and kernel-mode).
First Iranian National Cyber Security Festival held at Isfahan University of Technology.
Accepted as a Best Paper of the Sixth International Conference on E-Business System.
Held by Amirkabir University of Technology (Tehran Polytechnic).
We (UI-Cert team) got 2st place in NSEC CTF Final round, First NSEC CTF from Isfahan university of technology will be held under the name of First national festival of AFTA aka Amniate Fazae Tabadole Etelaat.
Nullcon was founded in 2010 with the idea of providing an integrated platform for exchanging information on the latest attack vectors, zero day vulnerabilities and unknown threats.
Invited presenter at Malwares Analysis workshop, Jihad University of UAST North Kh.
Copyright © 2013 - 2015 HamiD RezaeiBack to top
Social Profiles