This course demonstrates my technical application skills using various tools to understand how vulnerabilities affect systems and networks.
#1: Malware Analysis
In this lab, I analyzed two malware, such as Mirai and VIPkeylogger. This lab strengthened my technical understanding of how malware can give a hacker an advantage to disrupt a system or network without being detected.
#2: Passive Reconnaissance
In this lab, I conducted passive reconnaissance on a web camera by using the tools Shodan, WHOIS Domain Lookup, and MITRE ATT&CK. This lab taught me to identify potential entry points and vulnerabilities such as privilege escalation, authentication bypass, and remote command injection.
#3: SQL Injection
In this lab, I executed SQL injections using DVWA, Kali Linux, and Mutillidae. Utilizing sqlmap and SQL injections such as “cyse-450”, I was able to bypass authentication to obtain login credentials from the database. Through investigating both applications, I gained an understanding of how to execute and protect against SQL injection attacks.