Penetration Testing/Ethical Hacking
1.Steganography Assignment
This assignment involved using Kali Linux and the steghide command to hide a secret message withing a image file. I used hashing techniques, metadata analysis, and file manipulation to extract and view the hidden message. The main goal is to understand data hiding techniques and their applications in cyber security
2. Foundations of Cybersecurity Final Exam
This exam covers theoretical and practical aspects of cybersecurity, which includes: access control, privilege escalation, code vulnerabilities and race conditions. The tasks were to analyze code for vulnerabilities like insecure file access, buffer overflows, privilege programs, and race condition prevention techniques in multi-process systems.
3.Traffic Sniffing
This assignment focuses on network traffic analysis using Wireshark and tshark. I acted as an attacker to sniff LAN traffic and intercept data from FTP and ICMP communications. I learned how to apply filters to capture specific types of traffic, such as ICMP requests or FTP data, and extract sensitive information like passwords and file contents from intercepted traffic.
Artifact 1
Artifact 2
Artifact 3