Each one of these skills is going to show a core part of my professional identity, and what I bring to the table as a potential employee. While these are by far not the only aspects of me professionally, these three skills are great examples of my broad scope of abilities, and if there is any curiosity about what else I have in terms of experience, I also have my Resume under the About Me tab.
Ethical Hacking and Penetration is another critically important skill for a Cyber professional, with it’s important becoming even higher depending on how a professional wishes to specialize in their work. At a basic level, Ethical Hacking and Penetration is an important skill to learn to understand how a malicious attacker thinks. In order to understand how an enemy thinks, sometimes a person mut become the enemy, in the short term. For some cyber professionals though, it goes even further. There is also an entire career focused on hacking ethically against companies, by letting them know beforehand all that is going to happen, and ensuring that they will follow strict guidelines.
These are three assignments that exemplify my skills in ethical penetration testing.
SQL injection assignment (Assignment-11-SQL Injection)
For this assignment, I am also going to include a file with the instructions, since the assignment submission had screenshots for proof, but no text in it for explanations. The assignment submission itself will have to be a link to a Google Drive folder, because of it’s file size being too large to implement.
https://drive.google.com/file/d/1n5hFPs4vYEHhnzfGgZGpK89W7SbDpUCl/view?usp=sharing
I was tasked with practicing SQL injection in this assignment, which is injecting malicious code into a database in order to receive information that is supposed to be secure.
Packet sniffing assignment (Assignment-9)
https://drive.google.com/file/d/1XMkxT4CXd6KHSnXyj18C3ZePnSFwOPd5/view?usp=sharing
As part of this class, I also practiced packet sniffing, which is looking at data packets sent over a network, and reading the information inside. I have screenshots to show my work
False Browser Exploit Lab (Lab #15 Using Browser Exploitation to Take Over a Host’s Computer)
https://drive.google.com/drive/folders/1P42TGxQyk5FIvjPpUOLLbRUOMw8areZa?usp=drive_link
This assignment had me build a false website, and then had me redirect another user (this being me on another computer that I made via VM), and then steal any information that was input into the website.