Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Tag: Neo4j

Neo4j Implement PathExpander Sequence

August 22, 2013 rioasmara

Hi All, After took some rest for a while, I would like to post some kind of simple implementation of pathexpander since it is really

Continue reading

Vaadin + Springdata + Neo4j Basic Conf with Spring Context

September 12, 2012 rioasmara

Hi all, Recently I checked out the Vaadin web and browsed the add-on directory. Wow it looks so fun to see this framework is getting

Continue reading

Graph Database (Neo4j)

March 4, 2012 rioasmara

In the late of 2011, I’m looking for a new database solution that do not rely on RDBMS and ORM for the object oriented data

Continue reading

root#whoami

1. Penetration testing for banking industry such as Core Banking, SMS Banking, Transaction Switching, Payment Gateway, Mobile Banking, Online Banking, Online trading and Various Cards Application. Segmentation Test for PCI requirement

2. Malware and exploit research and analysis for common and targeted attack for Oil & Gas and Banking Industry.

3. Security code review for Python, PHP, C#, Java and C++

4. Threat hunting in the oil & gas and banking industry environment. Analysis of several log such as WAF, Firewall, IDPS, Web Application Server, Windows/Linux security event log, Internet Proxy

5. Threat Modeling and threat use case for banking application using OWASP and PASTA framework

6. AWS platform design and security hardening

7. Technical team leader for CSOC team which consist of 8 personel from various background such as SIEM, Public Key Infrastructure, Network Security.

8. Project manager for cyber security software and hardware implementation.

9. SIEM QRadar log onboarding, CRE (Custome Rule Engine), Develop new building block and AQL. SPLUNK log index query.

10. Depth Understanding on below

Burpsuite, Acunetix, Kali Linux, IDA Pro, X64dbg, Cerbero Advance, JEB Android, Hex Editor, Visual Studio, PyCharm, Autopsy and Vmware ESXi

Firewall : Checkpoint, Palo Alto, PFSence, NGINX and F5 Web Application Firewall
Proxy : Bluecoat Proxy
Antivirus/EDR : Symantec and CrowdStrike

Recent

  • Extracting PE from Memory using Process Hacker
  • Emulating malware with Dumpulator
  • Less Detectable with PPID Spoofing
  • Exploit Zabbix for Reverse Shell
  • Hiding Process Cmdline Argument
Blog at WordPress.com.
  • Follow Following
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 27 other followers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...