Amish completed his bachelor’s degree in Electronics & Communications in 2008, but developed an interest in computer hardware with engineering studies four years earlier. His key skills include web application, mobile application and infrastructure Penetration Testing. He began his professional life though working in the field of Communications managing RF links, switching afterwards to Networks and finally joining a network support team at a brokerage firm in 2010. This led to an interest in Information Security and consultancy work, where he gained experience carrying out various onsite and offsite security assessment and compliance projects.
As a Principal Security Consultant with over 13 years of expertise in the information security realm, he excels in efficiently leading teams, overseeing end-to-end client communication, and ensuring timely project delivery. His proficiency extends to conducting security assessments for various domains, including web applications, mobile applications, thick clients, and infrastructure. Additionally, He has successfully executed assessments for secure configuration reviews, secure architecture evaluations, threat modeling, and cloud security assessments.
In his free time he watches anime. 😃
B.E. in Electronics & Communication, 2008
Saurashtra University
I contributed to projects at AIRTEL BHARTI, specifically working with ALVARION and RADWIN devices and software. Our focus encompassed Wi-MAX and Point-to-Point communication, showcasing expertise in:
I contributed to projects at TATA Communication and AIRTEL BHARTI, engaging with TELSIMA, ALVARION, and RADWIN devices and software. Our responsibilities included Wi-MAX and Point-to-Point communication, demonstrating proficiency in:
In this blog, I and Sanjay have explained how we can capture any application network traffic in Android Studio Emulator. To begin, export the Burp certificate in the ‘DER’ format and save it to the base system, as illustrated in the following figure: Next, utilizing OpenSSL, convert the DER file to a PEM file. Afterward, rename the PEM file with the certificate hash and proceed to push the certificate to the emulator’s ‘/sdcard’ folder, as depicted in the figure below: