Boopathikumar Photo

BOOPATHIKUMAR MURUGESAN

Cybersecurity Researcher & Certified Penetration Tester

Welcome to My Cyber Domain

I specialize in identifying vulnerabilities, securing digital infrastructures, and performing deep analysis using tools like Wireshark, Nmap, and Metasploit. With hands-on experience in cyber security and ethical hacking, I am passionate about protecting digital assets and ensuring system resilience.

BOOPATHIKUMAR MURUGESAN

🔎Cybersecurity Researcher | Ethical Hacker🔐

boopathikumar-murugesan (LinkedIn) | 🌐linktr.ee/_boopathi | 📩 boopathikumar3509@gmail.com | 📍Chennai, Tamil Nadu

Objective:

Cybersecurity professional with a passion for dissecting complex problems and a solid foundation in penetration testing. Eager to apply my technical skills and analytical mindset to identify vulnerabilities, enhance system security, and contribute to a forward-thinking cybersecurity team.

Experience:

TECHNICAL SUPPORT
Yaway Technologies 07/2025 - Present

➤ Provide technical support to clients by diagnosing and resolving software, hardware, and networking issues.
➤ Manage user accounts, group policies, and system access in Active Directory.
➤ Perform installation, configuration, and maintenance of desktops, laptops, and peripherals.

Larsen & Toubro (Internship) 06/2024 - 10/2024
ISD Department at Chennai HQ
➤ Monitored internal network security using firewall and Cybersecurity Essentialssystem logs.
➤ Assisted in configuring Windows Server, user access permissions, and Active Directory Group Policies
➤ Performed computer troubleshooting, hardware Linuxdiagnostics and software issue resolution
➤ Conducted a supervised ethical hacking demonstration, showcasing reconnaissance vulnerability scanning, and Firewallexploitation techniques

Education & Certifications:

Certified Penetration Tester (CPT) 05/2025
Red Team Hacker Academy
➤ Specific knowledge in network and web application penetration testing, wireless security.

BE Computer Science Engineering (Cybersecurity) 2022 - 2025
Karapagam College of Engineering, Coimbatore
➤ Activity pursued self-learning beyond the curriculum, working on real-world security projects and participating in cyber competitions.

Diploma in Electronics and Communication Engineering 2019 - 2022
Kongunadu Polytechnic College, D.Gudalur
➤ Proficient in electronic circuit design, embedded systems, and communication technologies. Skilled in signal processing, troubleshooting and basic networking concepts.

Projects:

Honeypot-Based Intrusion Detection System
➤ Developed and deployed honeypots to detect and log unauthorized access, using Nmap, Wireshark and Bettercap and analyze attack behavior; real-time Gmail and Telegram alerts containing attacker username, IP address, behavior and activity details.

Traceable and Verifiable Secure Search in Hybrid Cloud
➤ Traceable and verifiable secure search in a hybrid cloud ensures user search activities are securely performed and logged. All searches are auditable across both private and public cloud environments.

Skills:

Technical Skills:
Offensive Security: Red Team Operations | Threat Intelligence | Vulnerability Analysis |
Defense & Security: SOC Concepts | Incident Response | Threat Detection
System & Network Security: Privilege Escalation | Network & Vulnerability | Web Application Security
Tools: Kali Linux | Metasploit | Burp Suite | Wireshark | Nmap | Hydra | John The Ripper | Bettercap
Techniques: Log Analysis | Malware Analysis | Command-line to diagnose and fix issues
Programming Languages: Python | Front-End Development

Soft Skills: Communication | Critical Thinking | Risk Assessment | Time Management | Collaborative Skills
Languages: English | Tamil

Certifications

Certified Penetration Tester

Certified Penetration Tester

Cyber Security Essentials

Cyber Security Essentials (LFC108)

Defence Security and Cyber Risk

Defence Security and Cyber Risk

Core Skills

Kali Linux

Penetration Testing & Ethical Hacking

Metasploit Framework

Using exploits to identify and assess security weaknesses during penetration testing.

Wireless Security

Wireless penetration testing involving WEP and WPA/WPA2 cracking.

Burp Suite

Web Application Security Testing

Nmap & Wireshark

Scanning, analyzing and mapping networks effectively.

Hydra

Identifying vulnerabilities and cracking logins to assess security weaknesses in client systems.

Steganography

Hiding digital content like text, images, videos, or audio to ensure secure communication.

Cookies Hijacking

Identifying vulnerabilities in web applications related to session hijacking.

Firewalls

Configuring and managing network firewalls securely.

Anonymity & Privacy

Using Tails OS, Tor, VPNs, proxies, and fake identities for secure communication.

Information Gathering and Reconnaissance

OSINT: Google dorking, image reversing, geolocation, metadata analysis.

Windows and Linux Privilege Escalation

Exploiting system flaws for unauthorized elevated access.

Active Directory

Managing and administering Active Directory, including user accounts, group policies, and domain services.

Fortigate Firewall

Proficient in configuring, managing, and monitoring FortiGate firewalls for network security and traffic control.

Hardware and Software Troubleshooting

Skilled in troubleshooting, installing, and maintaining both software and hardware systems for optimal performance.

Network Security

Knowledgeable in implementing and managing network security measures to protect systems from unauthorized access and cyber threats.

Contact