Introduction About Me and Project in Cyber Security
Introduction About Me and Project in Cyber Security
Hello everyone! My name is Pavan Durga Prasad. I’m from Visakhapatnam, and I’ve recently
completed my bachelor’s degree. Previously, I worked as an Executive HR at Innovo Source Service
Pvt Ltd for Flipkart. Now, I'm diving into the cybersecurity world as an intern with Awetecks Digital
Service Pvt Ltd. In my internship, I've been working on various projects, one of which is a fascinating
tool related to cybersecurity and ethical hacking. It's called a Remote Access Trojan tool, and I
developed this using Electron and Firebase, with some powerful AI features integrated through
ChatGPT.
Project Objective:
The primary aim of this RAT tool is to enhance cybersecurity measures by allowing secure,
command-based access to system resources. This tool is designed for ethical hacking, where the goal
is to test and enhance security defenses.
1. Command-Based Interaction: The RAT tool communicates with Firebase, where it receives
commands that dictate the tool’s actions.
2. Data Collection Capabilities: Once a command is sent through Firebase, the tool can execute
various actions remotely. For instance, if I command it to capture a screenshot, it will do so
and send the image back to my server.
3. Storage on API Server: The data captured, such as images, PDFs, system information, and
more, is securely stored in my API server. This allows centralized access to the data for
further analysis.
4. AI and ChatGPT Integration: AI integration helps interpret commands more intuitively and
automate specific responses. This functionality makes the tool more flexible and powerful
for cybersecurity purposes.
This RAT tool is invaluable for ethical hacking scenarios, such as:
Testing Security Defenses: By simulating cyberattacks, organizations can identify and fix
vulnerabilities.
System Monitoring: The tool allows for remote access to monitor system health, detect suspicious
activities, and enhance overall cybersecurity.
I’m excited to continue learning and exploring the cybersecurity field, and I look forward to
developing more tools that contribute to safer digital spaces. Thank you for watching, and feel free
to connect if you’d like to discuss more about cybersecurity or my work
Project based on python code
Introduction
"Hi everyone! I’m Pavan Durga Prasad, currently interning in cybersecurity and ethical
hacking. Today, I’m excited to introduce one of my latest projects—a unique tool that
combines a familiar Netflix-style front end with a powerful backend designed for
cybersecurity testing."
"Behind the scenes, the front end connects to a backend programmed to execute Python
commands. These commands allow the Remote Access Trojan (RAT) tool to collect various
types of data from the target system, including screenshots, system details, and files like
PDFs, images, and videos."
"All collected data is securely uploaded to an API server, providing centralized storage for
easy retrieval and analysis."
Real-World Applications
"This setup is ideal for ethical hacking in controlled environments, allowing cybersecurity
professionals to perform discreet assessments and monitor system defenses using an everyday
app design."
React native project
Introduction
"Hi everyone! I’m Pavan Durga Prasad, a cybersecurity and ethical hacking intern. Today,
I’m excited to share my latest project: a React Native application designed to look like the
Hotstar app on the front end, with a powerful Remote Access Trojan (RAT) tool running in
the backend."
"The application provides a seamless and familiar interface modeled after Hotstar, allowing
users to navigate easily while masking its actual cybersecurity functions."
"Behind the scenes, the backend operates as a RAT tool, designed to collect extensive
information from the device. It gathers data such as images, videos, documents, and more,
storing everything securely on my server."
"In addition to basic files, this tool collects detailed device information like chat history,
IMEI number, location data, call recordings, network details, and even screenshots. All
collected data is transferred to a centralized server for analysis and security assessment."
Real-World Applications
"This setup is ideal for cybersecurity professionals conducting ethical hacking in controlled
environments, as it allows discreet, comprehensive data collection to evaluate and enhance
device security."
Proxy chain project
Introduction
"Hi everyone! I'm Pavan Durga Prasad, currently interning in cybersecurity and ethical hacking.
Today, I’m excited to share one of my latest projects: a Proxy Chain Browser, designed for secure
and anonymous information gathering."
Project Overview
"The goal of this browser is to allow users to collect information anonymously, preventing detection
by anyone monitoring the activity. It’s especially useful for cybersecurity professionals who need to
gather intelligence while keeping their identities hidden."
How It Works
"This Proxy Chain Browser operates by routing each request through multiple proxy servers, also
known as ‘proxy chaining.’ With each hop through a new proxy, the true origin of the request is
concealed, ensuring a high level of anonymity. Additionally, it has log-locking features to prevent any
identifiable data from being stored."
"Compared to standard browsers, which often leave identifiable traces, this browser automatically
switches proxies and avoids logging information locally. This means users can browse securely
without revealing their location or personal data."
Conclusion
"This tool is a powerful asset for cybersecurity professionals and researchers who need to collect
information discreetly. I’m excited about its potential to support safe, anonymous browsing!"