← Back to cohort

Zumna Usman

FAST · 2024
Email
zumna.u@gmail.com
Phone
03315158695
LinkedIn
https://www.linkedin.com/in/zumna-usman/
GitHub

Academic

Program
CGPA
Year
2024
Education
Address
DOB

Verbatim text

The exact text the LLM saw on the page (or the booklet text from the old import). This is what powers semantic search.
Zumna Usman
03315158695
House number:654, street number: 103, sector: G-9/4, Islamabad
LinkedIn:
Education
FAST NUCES, Islamabad
BS(CY)
Computer Organization and Assembly Language, Networks and Cyber Security, Information Security,
Number Theory and Cryptography, Blockchain and Cryptocurrency, Vulnerability Assessment and Reverse
Engineering
Beaconhouse Margalla Islamabad
Mathematics, Physics, Computer Science, Chemistry
Islamabad Convent School
Physics, Mathematics, Biology
Projects
Final Project:
SENTRAC-IoT (Contiki, Cooja Simulator, GCC)
Developing and researching a Secure-RPL that secures constrained IoT devices by using ECC for Authentication
and SIMON for Confidentiality on Cooja Simulator.
Semester Projects:
Jihaadi (Bypassing Windows Defender & SmartScreen) (GCC, Python)
Bypassed Windows Defender by using obfuscation, encryption, and encoding techniques.
ML based IDS (Python)
Trained a model by using a dataset to detect malicious URLs using Python's Tkinter.
Malware Analysis (IDA Pro, Ghidra, x64dbg)
Static and Dynamic Malware Analysis of different malwares by using multiple tools.
AES-256 (C++)
Implementation of AES-256 in C++ performing encryption and decryption.
Work Experience
Cyber Security Intern, Software Productivity Strategists
April 2023 - October 2023
Paid internship for mapping Cyber Security Solutions/Products on NIST Framework including handling famous
organizations and their products.
Cyber Security Intern, Graxo Consulting
June 2022 - September 2022
Paid internship for GRC, blog writing and creating partnership proposals.
Threat Hunting & Intelligence Intern, Thincscorp
June 2022 - July 2022
Threat Hunting and Intelligence projects using Cuckoo Sandbox and Flare also including Malware Analysis
Skills & Tools
Professional Skills:
Technical & Business Writing, Communication & Presentation, Time Management
Technical
Skills:
C/C++/C#, Cryptography, Malware Analysis, Digital Forensics, Python, HTML/CSS/JS,
Mathematics
Achievements
Bronze Medal
Dean's List of Honor 4 times
Activities
General Secretary Events of Cyber Space Legion
General Secretary Management of Automotive Society
Teacher's Assistant of Artificial Intelligence, Information Security, Probability & Statistics.
Lab Demonstrator of Vulnerability Assessment and Reverse Engineering
zumna.u@gmail.com
https://www.linkedin.com/in/zumna-usman/
Majors:
Alevels (
)
Olevels (
)
AeroIntruder: Pioneering Autonomous Cybersecurity
Assessments with Drone Technology
AeroIntruder represents a groundbreaking leap in cybersecurity, leveraging autonomous
drone technology to create a comprehensive cybersecurity assessment & remote pen-
testing system. Targeting wireless networks and connected devices, AeroIntruder
adeptly navigates the complex stages of cyber threats, preemptively pinpointing
vulnerabilities to bolster digital defenses. At its core, the project involves thorough
network scanning and data collection, which lays the foundation for subsequent
vulnerability analysis and attack simulation. Users can command simulated attacks to
expose potential weaknesses, after which the system provides detailed security
enhancement recommendations and reports.
Key features include:
1. Autonomous Scanning: Drones autonomously scans the networks, collecting
extensive data for vulnerability analysis.
2. Vulnerability Assessment: Simulated attacks uncover potential weaknesses,
enabling proactive security measures.
3. User-Friendly Interface: Intuitive interface allows easy controlling of attacks and
gathering of data.
4. Versatile Applications: Beyond audits, AeroIntruder finds utility in critical
infrastructure protection and emergency response scenarios.
Technology Used:
Python, Bash, JS, AWS, KALI Linux,
DJI Drone, RasberryPi-4
Supervisor Name:
Ms. Hina Bint e Haq
Group Members:
Suleman Rehman (i19-1667)
Contact # - 03165011441
Saud Ul Huda (i19-1758)
Contact # - 03355885557
Hassaan Oumair (i19-1777)
Contact # - 03005599700
CTC-Crack the Case
Crack The Case is a SaaS platform for training, whilst keeping the perspective of individual
learners ranging from beginners to professionals and organizations who want to train their
employees regarding their cybersecurity needs. There are three views of this app –
Learners/Employee View, an Organizational Admin View and a Super Admin View (Platform
Admin) – the first is for the learners to use the features provided by our app to follow different
learning paths, solve cases, use forums, get AI chatbot assistance and master their
cybersecurity skills, after reaching a certain level, they are also able to create their own
content. The second is for Organizational Admins who have availed subscriptions and wish
to train their employees using custom learning paths, they are able to view employee
analytics and manage users for their particular organization. Lastly, we have the super
admin view, where platform users whether individual or organizations will be managed,
additionally, this dashboard will also be used to approve content uploaded by the platform
users.
Technology Used:
Python, FAST API, Firebase, Google
Cloud Platform, Tailwind, React, Docker
Supervisor Name:
Dr. Muhammad Asim
Co-Supervisor Name
Dr. Qaiser Shaf
Group Members:
Muhammad Huzaifa (i20 - 0604)
+92 300 9655860
Aisha Irfan (i20 - 1851)
+92 318 5703526
Abdullah Irfan (i20 - 2702)
+92 304  5403220
Green INT- Automated OSINT Tool
An automated open-source intelligence (OSINT) tool that scouts the surface and dark web
for human and network profiling information using various techniques such as web scraping,
data mining, and profile analysis. It compiles an intelligence report to aid in making well-
informed decisions.
Features:
1. Reverse checks email on 150+ sites.
2. Reverse checks usernames on 500+ sites.
3. Explore leaked Paksitani Databases by name, cnic, phone, province, city.
4. Explore Social Media Intelligence Anonymously.
Technology Used:
React, Python, Tor, Selenium, Firebase
Supervisor Name:
Dr. Muhammad Asim
Group Members:
Ashar Khalil (K20-1724)
+92 330 3511211
Faisal Subhani (i20-0955)
+92 310 7162277
Baqar Abbas (i20-0806)
++92 335 5185566
N-SAM
N-SAM is a web-based application that is developed while keeping in mind the importance
of security and specifically for small scale organizations that are unable to afford an
expensive SIEM or SOC. It can be defined better as a one stop network security and
management tool. An application that monitors the traffic details of the inbound and
outbound traffic of users over that network and log these details in a database. Performs a
detailed analysis on the logs and give Alerts based on the rules defined. It also gives a
detailed and enhanced report over different perimeters that a security engineer requires
for effective network security and management.
Features include:
- Active network logs monitoring, Fetching and parsing logs to be presentable and better
understandable
-Log Analysis with minimal delay
-Shows Alert for any violation or anomalies
-Modifiable rules and blocking of malicious traffic
- A detailed report with explanation of the behavior of network traffic behavior over a
defined range of time
Technology Used:
React, Java script, Mongo DB, Python,
Flask
Supervisor Name:
Mr. Muhammad Abdullah Abid
Group Members:
Umer Sajjad (I19 - 1795)
Contact: 0302-6436203
Osama Iftikhar (I19-1764)
Contact: 0317-5638091
Zein Rohail (I20-2441)
Contact: 0332-4422402
PARADEFENSE
This project aims to develop an advanced Intrusion Detection System (IDS) that harnesses
the power of parallel processing to effectively detect and analyze Distributed Denial of
Service (DDoS) attacks in real-time. The system is designed not only to promptly alert
administrators upon detecting a DDoS attack but also to generate comprehensive attack
reports for in-depth analysis. Additionally, it also includes a user-friendly front-end interface
that visualizes attack patterns, providing real-time monitoring of the incoming traffic. By
integrating parallel processing, our system aims to significantly enhance the speed and
accuracy of DDoS attack detection, empowering cybersecurity professionals to take
proactive measures against such attacks. Through this endeavor, the project aims to
contribute to the enhancement of cybersecurity measures by providing a sophisticated
detection tool against DDoS attacks, complete with real-time alerts and comprehensive
analytics. This proactive approach facilitates a deeper understanding of attack dynamics,
enabling more informed and timely defensive strategies.
Technology Used:
Python, React js, Open CL, Node js, ELK
stack.
Supervisor Name:
Dr. Qaisar Shafi
Group Members:
Syed Muhammad Owais Raza (i20 -
0403)
(Cell #) +923168311734
Syed Muhammad Farjad (i20 - 0872)
(Cell #) +923169550767
Sameel Ahmad (i20 - 0527)
(Cell #) +923046097333
PCAB – Peer Cab
Peer Cab is an innovative decentralized carpooling platform designed to address the
technology to ensure secure, tamper-proof, and transparent payment processes,
eliminating concerns related to financial fraud and monopolistic control. By fostering a
sense of community and environmental responsibility, Peer Cab transforms daily
commutes into shared, efficient, and secure journeys, positioning itself as a transformative
force in the carpooling industry. With the potential for global expansion, Peer Cab
represents a promising business opportunity in an evolving carpooling market.
Features:
1. Secure Payments through Decentralized Finance
2. Eco-Friendly Transport for a Greener Tomorrow
3. Simplifying your Commute with Ridesharing Services
4. Accessible ridesharing Solution designed for Women Travelers
5. PCAB Faucet: Your Gateway to Crypto Wealth
Technology Used:
React, React Native, Solidity, Remix,
Web3, Firebase, GitHub
Supervisor Name:
Dr. Muhammad Asim
Group Members:
Muhammad Ismail Ramzan(i20-0941)
+92 315 6991408
Muhammad Usman Shahid (i20-1797)
+92 312 6673713
Musaab Imran (i20-1794)
+92 322 7117752
Pocket Security: A Cyber Security Toolkit
Pocket Security is an android application for enhanced security awareness on the go.
With a suite of security tools, it empowers users to safeguard their digital presence
effortlessly.
After installing the app, the user needs to create a new account before he has access to
the application. Upon login the user is shown 2 features (1. Security Tools, 2. Security
Awareness). In bottom there is a chatbot icon from where user can ask anything.
Security Tools: Password Manager (remembers all your passwords and keeps them
encrypted) Intruder Photo Capture (takes picture of anyone trying to open your phone
when he inputs wrong password at lock screen) and Find my Phone (in a limited area with
clap or whistle)
Security Awareness: Common Cyber Attacks in the world, Cyber Security News and Blogs
to create digital security awareness among users.
Technology Used:
Android Studio, Firebase DB, Figma,
Kotlin
Supervisor Name:
Mr. Jawad Hassan
Group Members:
Khalil Ullah (19i-1951)
Contact # +92 3051851713
Haris Hameed (15i-0218)
Contact # +92 3212442747
SecT (Secure Transmission): A Zero Trust Network Access
Solution
SecT deploys a Zero Trust Network (ZTN) solution, independent of the underlying
infrastructure. Unlike traditional VPNs, which grant unsupervised, broad network access,
SecT follows the "Principle of Least Privilege," ensuring that users and devices receive
only the minimal required access. A unified management console centralizes control and
offers granular access policies with logging capabilities and analytics. This setup
enhances visibility across the organization and streamlines management.
When a SecT client requests access to a protected organizational asset, the request is
first verified by the controller. The controller then issues signed tokens and a Connector ID
based on the client's privileges. The client presents these tokens to the Relay, which
performs additional authorization before relaying the traffic to the designated Connector.
Acting as a proxy server, the Connector is responsible for facilitating communication
between the client and the internal resources.
Technology Used:
NextJs, NextAuth, Socket.IO, Python,
MongoDB, Docker
Supervisor Name:
Dr. Muhammad Asim
Group Members:
Fahad Waheed (20i-0651)
Contact # +92 320 9951882
Ubaidullah (20i-0541)
Contact # +92 333 5988256
Ghulam Murtaza (20i-0957)
Contact # +92 315 6130584
SENTRAC-IoT
SENTRAC-IoT focuses on researching and creating a Secure Routing Protocol for Low
Power and Lossy Networks (SRPL), designed to address the unmet challenges present in
the RPL within the expanding IoT landscape. While RPL efficiently transfers data in IoT
networks, it harbors significant security flaws, necessitating the development of an efficient
and secure routing protocol utilizing lightweight cryptography. Extensive research indicates
a lack of robust security mechanisms in IoT, leaving vulnerabilities such as external attacks
and privacy concerns such as forward and backward privacy unattended in the RPL. SRPL
offers authentication via Asymmetric Cryptography (ECC), which is also used for key
exchange and revocation, alongside SIMON for confidentiality and forward/backward
privacy, combining into a secure RPL. Evaluation metrics encompass Quality of Service
(packet delivery ratio, latency, throughput), resource efficiency (energy, memory,
bandwidth), and comprehensive security assessments.
Technology Used:
Cooja Simulator, Contiki, GCC, Ubuntu
Supervisor Name:
Mr. Jawad Hassan
Group Members:
Uzair Hassan (20i-0694)
Contact: 0315 5134394
Zumna Usman (20i-1873)
Contact: 0331 5158695
Fahad bin Rehan (19i-1702)
Contact: 0331 8855811

AI enrichment

Zumna Usman is a recent Computer Science graduate with specialized training in cybersecurity, including cryptography, malware analysis, and IoT security. She has completed multiple internships in GRC, threat hunting, and security solution mapping, alongside academic projects involving drone-based penetration testing and secure protocol development.
Skills (AI)
["Cybersecurity", "Malware Analysis", "Cryptography", "Python", "C/C++", "Digital Forensics", "IoT Security", "GRC", "Threat Hunting", "Penetration Testing", "Reverse Engineering", "AWS", "Kali Linux"]
Status: ai_done
Provenance
Source file:
Created: 1777723988