{"id":458,"date":"2025-12-05T19:58:57","date_gmt":"2025-12-05T19:58:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aberr019\/?page_id=458"},"modified":"2025-12-05T20:53:42","modified_gmt":"2025-12-05T20:53:42","slug":"threat-intelligence-penetration-testing","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aberr019\/threat-intelligence-penetration-testing\/","title":{"rendered":"Threat Intelligence &amp; Penetration Testing"},"content":{"rendered":"\n<p><strong>Overview<\/strong><\/p>\n\n\n\n<p>           I combine controlled testing techniques with structured threat analysis to understand how vulnerabilities are discovered, exploited, and mitigated. My vulnerability testing lab strengthened my ability to perform reconnaissance and evaluate internal security posture using Kali Linux and Ubuntu. I expanded this technical work through a MOVEit supply chain attack analysis, where I studied attacker behaviors, highlighted exploitation techniques, and assessed the effects. I continued to explore the growing problem of cybercrime and the jurisdictional, technological, and legislative challenges various groups face while attempting to protect victims through my cyberviolence white paper. Together, these artifacts demonstrate my combined capability in offensive testing, incident analysis, and informed threat intelligence interpretation.<\/p>\n\n\n\n<p><strong>Artifact 1 &#8211; Vulnerability Scanning Lab<\/strong><\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-71b37968-f131-4512-a93a-7d2d68e647f0\" href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/CYSE_450_Lab_3_Active_Vuln_Scanning.docx\">Linux Vulnerability Scanning Lab<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/CYSE_450_Lab_3_Active_Vuln_Scanning.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-71b37968-f131-4512-a93a-7d2d68e647f0\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact 2 &#8211; MOVEit Cyber-Attack Deep Dive<\/strong><\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-560c10b6-202f-45c4-8b33-67f90ec38484\" href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/MOVEit-Cyberattack-Deep-Dive.docx\">MOVEit-Cyberattack-Deep-Dive<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/MOVEit-Cyberattack-Deep-Dive.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-560c10b6-202f-45c4-8b33-67f90ec38484\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact 3 &#8211; Cyberviolence White Paper<\/strong><\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-bd3831fe-d38c-4594-ba92-22d00f5fca07\" href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/White-Paper-Assignment.docx\">Cyberviolence White Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/12\/White-Paper-Assignment.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bd3831fe-d38c-4594-ba92-22d00f5fca07\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview I combine controlled testing techniques with structured threat analysis to understand how vulnerabilities are discovered, exploited, and mitigated. My vulnerability testing lab strengthened my ability to perform reconnaissance and evaluate internal security posture using Kali Linux and Ubuntu. I expanded this technical work through a MOVEit supply chain attack analysis, where I studied attacker&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/threat-intelligence-penetration-testing\/\">Read More<\/a><\/div>\n","protected":false},"author":29079,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/458"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/users\/29079"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/comments?post=458"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/458\/revisions"}],"predecessor-version":[{"id":475,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/458\/revisions\/475"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/media?parent=458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}