Skip to main content
  • Conferences
  • Speakers
  • Skillcamp
Notifications
  • Strategies for Online and Offline Success
    ×
  • That Will Get You Speaking Engagements in 2024
    ×
  • For a Meeting or Talk
    ×
  • SpeakerHub's commitment to innovation and user-centric design.
    ×
  • How to Make Your Public Speech Professional and Memorable
    ×
  • SIGN UP
  • SIGN IN
  1. Home
  2. Find a speaker
  3. Adithyan Ak
Adithyan Ak's cover banner
Adithyan Ak's picture

Adithyan Ak

Mr.
Security Researcher
TPH Infosec
Country or state 
India
Available to 
Global
City 
Coimbatore
Fee 
Ask for pricing
Languages 
English
Volunteer
Yes

Personal Details

Bio

Im the Chapter Head of Open Web Application Security Project, Coimbatore. I had delivered my guest lectures and at various universities and colleges around India including IIT Madras. I spoke at various cyber security conferences including Defcon Trivandrum. I found more than 4 CVE on Wireless Router and written several exploits. I have conducted workshops on Ethical Hacking and Penetration Testing. I hold 6 years experience in the field of Information Security.

Current position (1)

Security Researcher

TPH Infosec

Achievements (1)
Guest Lecture at IITM

Gave guest lecture on Android Penetration Testing at IITM Research Park

Degrees (1)
Information technology
Sri Krishna college of engineering and technology
2017

Presentations

Presentations (1)
Router Firmware Reverse Engineering and Backdooring

The firmware of TP-Link router is downloaded from the internet. The reverse engineering of the firmware is done with binwalk and firmware-mod-toolkit. After extraction, a suitable payload is generated via Metasploit based on the firmware in suitable elf format. After payload generation, the payload is binded with /etc/init.d file or with any other scripts in that directory. The modified firmware is finally compiled and put together. After the flashing of the firmware in the router, the msf reverse shell is obtained from the router to the attacker machine and a command shell is attained.

  • All (3)
  • Videos
  • Photos (1)
  • Slides (1)
  • One sheet (1)
This speaker hasn't uploaded any videos yet.
arp ppt.pptx
ARP Poisoning
This speaker hasn't uploaded any press information yet.

Books & Articles (3)

How to inject cryptominers into local network
Sniffing HTTPS Traffic by SSL Strip
MITM Attack using Burpsuite to Intercept SSL Credentials

Expertise (11)

Technology
Ethical Hacking Penetration testing conventional cybersecurity Cyber Attacks Cybercrime cyber defense Cyber Education Cyber Fraud cyber ethics Digital Forensics

Reviews

Testimonials (1)
  • Invited him to give a guest lecture on Ethical Hacking in our workshop. Such a humble and smart person. Had a great time with him.
    Max Kossatz
Recommendations
2 Audience
Show More
Why choose me? 

Adithyan AK is a Security Researcher and a Public Speaker. He has given his guest lectures at IITM.

Similar to Adithyan
  • Tom Van de Wiele's picture
    Tom
    Van de Wiele
    Ethical Hacker | Speaker | Advisor
    Hacker Minded
  • Brice Self's picture
    Brice
    Self
    Founder/Owner
    Fortified Solutions LLC
  • Janice Gravely's picture
    Janice
    Gravely
  • Pete Canavan's picture
    Pete
    Canavan
    Owner
    PJC Services
  • Theepika Jayasekaran's picture
    Theepika
    Jayasekaran
    Chief executive officer
    Vetri Tec Solutions
  • Speakers
  • Agencies
  • Events
  • How it works
  • Blog
  • Upgrade
  • Podcast
  • About us
  • Organizers
  • Terms of use
  • Privacy policy
  • FAQ
  • API
  • Contact
  • Corporate Speakers Bureau & CRM
  • Motivational speakers
  • Leadership speakers
  • Business speakers
  • Inspirational speakers
  • Keynote speakers
  • Corporate speakers
  • Celebrity speakers
  • Top 50 Business Speakers
  • Top 50 Leadership Speakers
  • Top 50 Motivational Speakers
  • Top 50 Technology Speakers

Get speaking tips & so much more!

Twice a month we send you speaking tips, training ideas and lots of useful updates.

© 2026 SpeakerHub
All rights reserved.

  • Facebook
  • Twitter
  • LinkedIn
  • SoundCloud