About
π Harsh Srivastava
Cyber Security Engineer β’ Pentester β’ Security Researcher
π§ Who Am I
I am a passionate Cyber Security Engineer with a strong focus on identifying and exploiting real-world vulnerabilities across IoT devices, Operational Technology (OT), and Web and Mobile Applications.
My work revolves around understanding attacker mindsets, analyzing complex systems, and performing deep security assessments on connected devices and industrial environments.
I actively document my hands-on research, lab experiments, and exploitation methodologies through this blog to contribute to the cybersecurity community.
πΌ Professional Experience
π’ Tata Consultancy Services (TCS)
Role: Cyber Security Engineer / Pentester Duration: 2024 β Present
At TCS, I work on security assessments and penetration testing activities, focusing on identifying vulnerabilities, validating risks, and strengthening organizational security posture through practical offensive testing methodologies.
My work includes:
- Vulnerability Assessment & Penetration Testing (VAPT)
- IOT/OT Security Testing
- Application Security Testing
- Network Security Assessments
- Reporting & risk remediation guidance
π Education
π Bachelor of Technology (B.Tech)
Institute: Institute of Engineering & Management (IEM) Stream: Computer Science & Engineering Specialization: IoT, Cyber Security & Blockchain Technology (IOTCSBT)
My academic journey built the foundation for my work in:
- Embedded & IoT Security
- Network & Systems Security
- Cryptography fundamentals
- Secure application development
π¬ Research Domains
π’ IoT Device Security
π’ Operational Technology (ICS/SCADA) Security
π’ Hardware Pentesting (UART β’ JTAG β’ SPI β’ Flash)
π’ Firmware Extraction & Reverse Engineering
π’ Industrial Protocol Analysis
π’ Web Application Security Testing
π’ Vulnerability Assessment & Penetration Testing
π οΈ Tools & Arsenal
1
2
3
4
Burp Suite β’ NRF Connect β’ Wireshark β’ Nmap β’ Metasploit
mitmproxy β’ tcpdump β’ YABE β’ OpenSSL
Binwalk β’ Frida β’ Objection β’ mbpoll β’ Zigbee auditor
Hardware UART/JTAG Interfaces
I combine software and hardware testing methodologies to simulate real attacker capabilities.
π§ͺ Practical Labs & Research
I strongly believe in hands-on offensive security.
My research workflow includes:
- PortSwigger Web Security Academy Labs
- Real device pentesting & teardown
- Firmware dumping & analysis
- Exploit development & PoC creation
- Network traffic interception
- Protocol fuzzing
This blog serves as my public research journal documenting technical findings and lab walkthroughs.
π― Mission & Vision
My mission is to contribute to a safer digital and industrial ecosystem by:
- Publishing deep-dive technical research
- Demonstrating real exploitation scenarios
- Raising awareness about IoT & OT threats
- Promoting secure design and deployment practices
βThe more we understand how systems break, the better we can defend them.β
π€ Connect & Collaborate
π LinkedIn: linkedin.com/in/harsh01200
π» GitHub: github.com/harsh020100
π¦ Twitter / X: twitter.com/princeX2001
π§ Email: harsh01200@gmail.com
π§Ύ Research Ethics & Disclosure
All research published on this blog is conducted within controlled environments or authorized testing scenarios. The objective is strictly educational and defensive β to improve security awareness and resilience.