Kundan Dhupkar
About Me
I'm Kundan Dhupkar, a Cyber Security Student
Hi! My name is Kundan Dhupkar. I am a cybersecurity student with hands-on experience in web security, penetration testing, and SOC fundamentals through platforms like TryHackMe, PentesterLab, and PortSwigger's Web Security Academy. I also run a blog simplifying complex security topics, with a focus on Web Application Security, Linux, and Cryptography. Actively seeking entry-level roles to apply and grow my skills in real-world environments.
Birthday : 22 May 2004
Age : 21
Website : kundandhupkar.github.io
Email : dhupkarkundan@gmail.com
Degree : B.Sc Cyber & Digital Science
Phone : +91 93xx xxx xxx
City : Pune
Freelance : Available
Education
2022 - 2025
B.Sc Cyber & Digital Science
Savitribai Phule Pune University(SPPU)
2020 - 2022
HSC, Computer Science
Fergusson College
Hands-On Training
2022 - Present
Web Security Academy - PortSwigger Labs
Completed 80+ labs on PortSwigger's Web Security Academy, gaining in-depth experience with web vulnerabilities like XSS, SQL Injection, and more.
2020 - Present
TryHackMe - CTFs
Solved over 220+ rooms on TryHackMe, focusing on real-world cybersecurity challenges and practical skills.
Skills
Log Analysis
Experienced in analyzing Windows, Linux, and network logs to detect suspicious activities.
SIEM Monitoring
Skilled in using SIEM tools like Splunk and Microsoft Sentinel to monitor and investigate alerts.
Incident Response
Familiar with handling alerts and documenting incidents following standard response procedures.
Alert Monitoring
Actively monitored real-time alerts and escalated potential security incidents as per playbooks.
Threat Intelligence
Used threat feeds and IOC sources to enrich incident context and improve detection capabilities.
Malware Indicators
Basic understanding of malware behavior and how to detect IOC patterns in logs and alerts.
MITRE ATT&CK Mapping
Mapped detected threats and alerts to MITRE ATT&CK TTPs for better analysis and reporting.
Security Reporting
Prepared incident summaries and shift-wise reports with clear findings and recommendations.
Firewall & IDS Monitoring
Reviewed firewall, IDS/IPS logs to identify scans, brute-force attempts, and suspicious access.
Vulnerability Management
Worked with tools and reports to track known vulnerabilities and support patch management.
Network Traffic Analysis
Used tools like Wireshark and packet captures to identify anomalies in traffic flow and behavior.
Email Security Review
Analyzed phishing emails and headers to extract indicators and determine compromise level.
Endpoint Monitoring
Reviewed endpoint alerts from EDR tools to detect malware, persistence, and unauthorized access.
Ticket Handling
Worked with ticketing systems like ServiceNow to document, update, and close incident tickets.
Case Documentation
Maintained detailed incident notes and evidence for each case handled during shift operations.
Threat Hunting (Basic)
Performed basic hypothesis-driven hunting based on abnormal user or system behaviors.
SIEM Query Writing
Comfortable writing SPL and KQL queries to filter logs and extract meaningful data.
Windows Log Analysis
Reviewed Security, System, and Application event logs for signs of compromise or abuse.
Linux Log Monitoring
Analyzed auth.log, syslog, and audit logs to detect failed login attempts and unusual activity.
Shift-Based Operations
Adapted to 24x7 SOC environments with alert triage, handovers, and effective time management.
Penetration Testing
Hands-on experience with tools like Burp Suite, OWASP ZAP, and various Kali Linux tools for identifying and exploiting vulnerabilities.
Web Application Security
Practical experience in web application security testing and exploiting vulnerabilities (XSS, SQLi, etc.) from 50+ labs on PortSwigger.
Network Scanning & Reconnaissance
Skilled in using tools like Masscan, Naabu, and Nmap for network scanning and reconnaissance.
OWASP Top 10
Familiar with the top web application security risks as outlined by OWASP, including understanding and mitigating common vulnerabilities like SQL Injection, Cross-Site Scripting, and Security Misconfiguration.
Computer Networking
Solid foundation in networking concepts, including TCP/IP, DNS, and protocols essential for network communication, along with experience in diagnosing and securing network architectures.
Python
Proficient in Python for scripting, automation, with experience in using Python libraries for cybersecurity tasks, such as network scanning and web testing.
Bash
Skilled in Bash scripting for automating repetitive tasks, managing files, and conducting system-level operations essential for cybersecurity workflows on Unix-based systems.
Network Security
Hands-on experience in implementing security measures like firewalls, intrusion detection systems, and VPNs to protect networks against unauthorized access and threats.
Cryptography
Understanding of cryptographic principles, including encryption, hashing, and digital certificates, with practical experience in securing data through cryptographic techniques.
Cloud Security
Knowledgeable in securing cloud environments, including familiarity with AWS and Azure security practices, identity management, and configuring cloud security settings to prevent unauthorized access.
OSINT (Open-Source Intelligence)
Proficient in OSINT techniques to gather publicly available information from various online sources, aiding in reconnaissance and threat assessment in cybersecurity research.
Cyber Threat Intelligence
Skilled in gathering and analyzing threat intelligence to identify indicators of compromise and potential attack patterns, helping to strengthen proactive defense strategies.
Secure Coding Practices
Knowledge of secure coding standards for Python, JavaScript, and PHP, with a focus on OWASP Top 10 vulnerabilities.
Cybersecurity Tools
Experience with tools like Burp Suite, OWASP ZAP, Nuclei, FFuF, GoBuster, Amass, and Subfinder for reconnaissance, enumeration, and vulnerability scanning.
Linux System Administration
Competent in system administration tasks, troubleshooting, and configuration of Linux environments (Ubuntu, Kali).
Problem-Solving
Strong analytical skills in identifying security vulnerabilities and solving complex technical challenges.
Attention to Detail
Proven ability to find and report even subtle issues in web applications and networks.
Communication
Clear and effective communicator when documenting vulnerabilities and writing reports for secure coding and bug hunting.
Certificates & Achievements
Certificates
October 2024
Crash Course on Python
October 2024
Certified Network Security Practitioner (CNSP)
The SecOps Group
September 2024
Certified AppSec Practitioner (CAP)
The SecOps Group
May 2024
Google CyberSecurity Specialization
January 2024
Digital Forensics Essentials (DFE)
EC-Council
December 2023
Ethical Hacking Essentials (EHE)
EC-Council
December 2023
Network Defense Essentials (NDE)
EC-Council
December 2021
Defronix Certified Junior Security Practitioner
Defronix Cyber Security
Achievements
December 2024
Listed in NASA's Hall of Fame
Received Hall of Fame for identifying vulnerabilities in NASA's systems and responsibly reporting them.
August 2021
Security Research Hall of Fame - Process Street
Received recognition in the Bug Bounty Hall of Fame. Acknowledged by Process Street for responsibly disclosing vulnerabilities and working with the team to remediate them.
Projects
TraceFox - Domain OSINT Tool
TraceFox is a Linux-based OSINT (Open Source Intelligence) tool designed for gathering and organizing domain and organization-related information. It focuses on simplicity, speed, and effectiveness, making reconnaissance more efficient. The tool is scalable, with future plans for additional features.
Secure Coding 101
Developed a comprehensive guide on secure coding practices covering Python, JavaScript, and PHP.
Latest Blog
Understanding OAuth 2.0: What It Is and How It Works
Learn the core concepts of OAuth 2.0 in a simple and structured way. You'll learn about its roles, flows, access tokens and how it enables secure delegated access to APIs and resources. Whether you're a beginner or someone looking to strengthen your foundation, this guide will help you understand how OAuth 2.0 actually works under the hood without skipping important technical details.
Understanding Content Security Policy (CSP): How it Works and Why It Matters
Learn what Content Security Policy (CSP) is, how it works under the hood, and why it’s a critical layer of defense against attacks like Cross-Site Scripting (XSS). This guide breaks down CSP concepts and directives in a practical, easy-to-understand way.
How the Web Works: Exploring Its Architecture and Components
This blog provides a deep dive into the web request flow, explaining each step from the browser to the server and the various components involved. It highlights key elements such as DNS resolution, proxies, load balancing, CDNs, and WAFs, while addressing potential challenges and solutions for building a secure and efficient web infrastructure.
SameSite vs. Same-Origin: Breaking Down Web Security Confusions and Nuances
This blog simplifies the key differences between SameSite and Same-Origin policies, focusing on their impact on web security and how they prevent common vulnerabilities like CSRF.
Linux System Administration Essentials (Part 3): Package Management, Kernel Updates and System Monitoring
In this part of the Linux System Administration Essentials series, we explore critical administrative tasks, including managing software packages with package managers like APT and DNF, performing kernel updates, handling system reboots, analyzing log files for troubleshooting and monitoring system performance.
Linux System Administration Essentials (Part 2): Disk Partitioning, User Management and Network Configuration
In this part, we dive into partitioning and setting up the file system. You'll also learn how to effectively manage users and groups, configure network settings and troubleshoot network issues.
Linux System Administration Essentials (Part 1): Introduction
The first part of the "Linux System Administration Essentials" series, introducing key concepts like the Linux OS Kernel, file systems, the role of system administrators, and core shell commands.
The Heart of Secure Communication: Cryptography and Digital Trust
This article explores the core principles of secure communication, focusing on symmetric and asymmetric cryptography, digital signatures, and digital certificates. It explains how these technologies work together to ensure data confidentiality, integrity, and authenticity in the digital world.
Contact Me
Call
+91 93xx xxx xxx
Location
Pune, India
dhupkarkundan@gmail.com