Security Research • Offensive Security • SRC • ICS & OT • Vulnerability Disclosure
Security researcher with responsible vulnerability disclosures across Microsoft, Apple, NASA, OpenAI, JPMorgan Chase, and Infosys (CERT-In acknowledged). Discovered CVE-2025-55182 affecting production sites including The Economic Times. Contributed security findings to open-source projects Metabase and Uptime Kuma (80K+ GitHub stars). Conducted red team adversarial simulations on ICS/SCADA infrastructure for critical energy systems at Con Edison. MS in Cybersecurity from Pace University (3.9 GPA, Summa Cum Laude). I find real vulnerabilities in real systems — and I document how to fix them.
Active researcher conducting structured security assessments across enterprise, open-source, and public-sector environments.
Discovered on admin portal page via FOFA & Shodan recon. Affected production sites including The Economic Times (Times Internet) and multiple AWS-hosted apps. CERT-In acknowledged.
Remote protocol-level request smuggling affecting reverse proxy patterns.
Maintainer acknowledged. Patch discussion ongoing.
Discovered during source-code review of query execution flow.
Merged into primary advisory. Also identified credential metadata disclosure (GHSA-vh2p-7mqh-wwhw).
Timing attack via response-time analysis. Microsoft was unable to reproduce.
Vendor reproduced. Patches rolling out for impacted versions.
Patch created and published by maintainers.
Vendor removed logging in subsequent release.
Acknowledged by Infosys CERT / CERT-In.
Infrastructure reconnaissance exposure via Synack Red Team.
Maintainers accepted patch. Acknowledgment
Passive endpoint discovery.
Discovered via endpoint analysis.
macOS Atlas browser. 644-permission logs persisted OAuth tokens. Informational hardening recommendation.
Unfiltered axios.get() call enabling internal port-state differentiation. Authenticated-only access.
Adversarial simulation within SCADA-controlled energy environments at the Pace Cyber Range.
Simulated adversarial attacks against OT environments, performing Modbus protocol exploitation using mbpoll to manipulate PLC registers and coils.
Engineered sensor spoofing techniques to alter SCADA logic states and evaluate resilience of energy control workflows.
Deployed and configured Wazuh agents with firewall telemetry ingestion from pfSense, enabling centralized OT/IT log correlation and threat detection.
Contributed to NYMEGA AI-SCADA visualization modeling, mapping control flow and entity interactions to enhance red team training realism.
Live Modbus register manipulation and PLC coil forcing conducted in an authorized academic cyber range.
Hands-on security engineering, adversarial experimentation, and research-driven system analysis across DFIR, malware, network security, wireless exploitation, and applied machine learning.
Designed and developed a Windows-based persistence detection framework to identify malicious services and startup artifacts through executable hashing and threat intelligence correlation. • Enumerates services and startup entries using system-level inspection • Validates executables against VirusTotal intelligence feeds • Automates structured PDF threat reporting • Integrates AI-assisted malware context summarization
Conducted deep static and dynamic analysis of real-world ransomware and banking trojans including WannaCry, Ryuk, and Shylock to understand infection chains, crypto routines, persistence mechanisms, and C2 behavior. • Reverse engineered binaries using IDA and Ghidra • Traced encryption workflows and execution logic • Extracted IOCs and monitored DNS/HTTP command-and-control traffic • Developed custom YARA rules for detection and hunting
Performed hands-on exploitation and protocol-level analysis across IEEE 802.11 wireless environments to replicate enterprise attack paths and evaluate detection strategies. Captured and cracked WPA/WPA2 authentication handshakes • Executed deauthentication and rogue access point attacks • Analyzed WPA-Enterprise authentication flows • Inspected raw wireless frames and client association behavior
Competitive exposure across national security challenges and hackathons.
National Cyber League (NCL)
• Top 7% nationally (Rank 356 / 4,898 teams) - Fall 2024
• Secured #1 position at Pace University
• Team Lead across OSINT, Cryptography, Web Exploitation, Network Analysis challenges
ISC2 CTF – Saint Peter's University, NJ
• Team Lead • Placed 7th out of 40 teams
NSA Codebreaker Challenge
• Completed advanced reverse engineering and exploitation-based security challenges.
Hackathons
• ShellHacks 2024 – Florida International University
• VTHacks 2024 - Virginia Tech - Developed "FinShield" cyber risk modeling solution
Leadership
• Regional Moderator - Northeast Collegiate Cyber Defense League (Pace University)
• Graduate Project Team Lead - CVSS v3 Vulnerability Severity Prediction (ML-based)
Seidenberg School of Computer Science & Information Systems
MS – Cybersecurity (2023–2025) GPA: 3.9 / 4.0 - Summa Cum Laude
Relevant Focus: Network Security & Defense • Ethical Hacking • Malware Analysis & Reverse Engineering • Mobile Forensics • Security Automation • Cybersecurity Capstone
BE – Computer Science & Engineering (2020–2023) GPA: 3.7 / 4.0
Leadership & Involvement: • Vice President - Cortex Forum
Class Representative (3 Years) • Core Member - Coding & Ethical Hacking Club
Information Security Manager at AMD | Associate Professor, Pace University
"Karan has an exceptional talent for cybersecurity. His strengths in penetration testing, vulnerability assessment, and ethical hacking are matched by his strategic thinking about the future of cyber defense. He combines technical depth
with professionalism, curiosity, and determination - qualities essential in modern security engineering. I am confident he will be a valuable asset to any organization."
Senior Technical Staff Member, IBM | Stanford University | Professor, Pace University
Karan demonstrated strong analytical rigor and depth in data-driven security research. His statistical modeling work reflected publication-grade structure, clarity in methodology, and thoughtful interpretation of complex datasets.
• Publication-level formatting and structured methodology
• Independent statistical reasoning
• Novel insight extraction from widely studied datasets
Faculty endorsement highlighting my structured security research, statistical depth, and adversarial mindset.
CRTA – Red Team Analyst (CWL)
ISC2 – Certified in Cybersecurity (CC)
ISAC – Certified Penetration Tester (NCPT)
Oracle – OCI Architect Associate
Engaged in industry conferences and research forums focused on enterprise security, AI, and adversarial defense.
• IBM Security Summit – Wall Street
• Microsoft Cyber Security Conference
• Microsoft AI Tour
• Google Developer Fest
• CSAW Security Conference - NYU
• New York Metro Joint Cyber Security Conference
• Engaged with global institutions including the World Health Organization (WHO)