top of page


Running a Blockchain locally can help restore data from a ransomware attack using the IPFS File System.
What if we could use a hacker’s favorite buzzwords — blockchain and decentralization — to fight back against ransomware? As a cybersecurity grad student, I often build and test real-world attack scenarios. But this time, I wanted to take it one step further. Instead of just detecting or analyzing ransomware, I wanted to create a backup system that could survive it completely and even recover files without paying a dime. And it worked. Using IPFS for file storage, a smart cont
prabhu perumal
Dec 15, 20254 min read


Compression and Encryption - How does it look in binary?
When managing files on a computer, you might encounter the terms "encryption" and "compression." Both alter your data, but for entirely...
prabhu perumal
Sep 6, 20253 min read


Reverse Engineering : Apple’s AirTag
Imagine losing your keys in a coffee shop. Hours later, you're staring at your iPhone, which pinpoints their last known location on a map—thanks to a tiny AirTag and an anonymous stranger’s iPhone. But here’s the catch: Neither Apple, nor that stranger, nor even the AirTag itself knows your keys were found. At least, that’s what the marketing says. For our graduate project in Network Security , I dissected the Apple AirTag’s cryptographic design . We explored public resea
prabhu perumal
Jun 22, 20254 min read


Exploiting Web Applications: Identifying Weaknesses and Vulnerabilities - Part 1
Web Application: This acts as the interface between users and web servers through web pages. It enables users to request, submit, and...
prabhu perumal
May 19, 20255 min read


“I love you in different languages.”
This blog explores that intent through the lens of the simplest, most powerful phrase: I love you. Shell Scripting Languages Bash:...
prabhu perumal
May 19, 20252 min read


Behind the Commendation: Cyberforce 2024 and My Approach to Vulnerability Documentation.
When I worked on the vulnerability documentation for the Cyberforce program 2024, I focused on making it clear, structured, and easy to...
prabhu perumal
Dec 12, 20243 min read


S3 Buckets and Privilege Elevation: What Could Go Wrong?
1. Cracking the Cloud: Public or misconfigured S3 Buckets, what I excited and Security Oopsies. Amazon offers something called blob...
prabhu perumal
Dec 11, 20244 min read


Computer Breach and Data Loss (Basic Essential)
Overview of the Incident: A hacker gained access to the company's network through a phishing email that was sent to an employee. The...
prabhu perumal
Feb 29, 20247 min read


Vulnerability Management
60% of security patches happen because of unpatched vulnerabilities, updates, weaknesses, or threats. WHEN : Numerous security breaches,...
prabhu perumal
Dec 18, 20232 min read
bottom of page