About

cropped-158332928_4031280893583635_4912141347984268643_o.jpg

Rio Asmara Suryadi’s professional journey extends over 20 years, during which he has cultivated a profound expertise in cybersecurity. His experience is multifaceted, covering offensive security (penetration testing, red teaming), defensive security (blue teaming, SOC operations, incident response), malware analysis, exploit research, security architecture, and secure software development. He has demonstrated a consistent ability to adapt and excel in various high-stakes environments, from financial institutions to major energy corporations. His career reflects a deep understanding of both the technical intricacies and the strategic imperatives of cybersecurity. The breadth of his experience across industries such as Oil and Gas, Software Development, Banking, and Aviation underscores his versatility and the wide applicability of his skill set. This diverse industry exposure has likely provided him with a unique perspective on varying threat landscapes and regulatory environments, enriching his approach to cybersecurity challenges

SkillSpecific Skill/Tools
Penetration Testing & HackingBurp Suite, Acunetix, Kali Linux, Metasploit
Malware AnalysisIDA Pro, x64dbg, Hex Editor, Visual Studio, PyCharm, Autopsy, VMware ESXi, BinaryNinja
Incident Response & ForensicsVelociraptor, CyberTriage, Magnet Axiom, Autopsy
SIEM & Log ManagementIBM QRadar (CRE, AQL), Splunk (SPL)
Firewalls & WAFCheckpoint, Palo Alto, PFSense, NGINX, F5 Web Application Firewall
Proxy ServersBluecoat Proxy
Antivirus/EDRSymantec, CrowdStrike, Cylance, SentinelOne
Cloud PlatformsAmazon Web Services (EC2, Fargate, S3, Load Balancer, VPN), Microsoft Azure (Security Design, RBAC, Policy)
Programming/ScriptingPython, C#, C++
Operating SystemsWindows (Workstation, Server, GPO, Local Policy), Linux
Network SecurityIDPS, Network Segmentation, VPN (IPSec, OpenVPN), Secure Network Design
Web Vulnerability ScannersAcunetix and Burpsuites
Frameworks & StandardsOWASP, PASTA, STRIDE, PCI DSS

7 comments

  1. Hello Mr. Activiti,

    I am trying to integrate the workflow with my struts-spring based application.
    can you please show me a short step by step (text-demo )…like (self registration page for users-> submitted for approval–>approved/ignored–>saved in legacy database/form dropped.).
    actually, where i am facing problem is…
    after converting a web development project to maven project..
    i tried to introduce .bpmn file, application context-spring.xml.POm.xml. and related depencies…
    but facing multiple errors relation m2Eclipse version and form not found…
    I also tried to follow ur blog of 26th jan 2013.. but again same..
    so, kindly help me out in this integration process.

  2. Hello rioasmara I’ve gone through your blogs, Post those are some high level knowledge, thank you for such knowledge sharing. I want to understand a proper approach on how to make tailor made malware to protect my company by constantly checking the worth of EDRs and other solutions.

    Please let me know if you have some good material repositories or anything do let me know.

    Thanx

    1. Hi,
      The first approach is to understand your EDR configuration. Some EDR become less effective on detecting malware because of missed configuration where you will find default configuration, wrong customization, whitelist here and there and so on.

      The second approach that you have to understand the behaviour of your EDR product. Nowadays, EDR are using combination of multiple information during analysis such as Windows API Calls, Static Analysis, Process tree, Interaction with other process, Network activities, Dll loading, Interaction with OS and etc. So there will be no single way to bypass all EDR. You will find that your EDR will prioritize only to some information for analysis compared to the other to optimize the detection time.

      The third approach is to keep updated with latest APT techniques and research on windows API (Alot of undocumented windows API being abused) if you were testing windows based malware.

      The fourth approach is to continuesly adjust the EDR configuration following the dynamic of your environment and latest type of attack.

  3. Hey! Impressive work maintaining this the last 10 years. Curious if you’ve considered moneization with a display ad layout prior

  4. Hi Rio, please reach out to me regarding your post in relation to “COBALTSTRIKE DNS BEACON LAB SETUP”. I have also sent you a connection request on LinkedIn. Thank you.

Leave a reply to Matthew Boylan Cancel reply