{"id":431,"date":"2026-04-21T20:32:52","date_gmt":"2026-04-21T20:32:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/destinyh\/?page_id=431"},"modified":"2026-05-04T01:49:01","modified_gmt":"2026-05-04T01:49:01","slug":"ethical-hacking","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/destinyh\/ethical-hacking\/","title":{"rendered":"Ethical Hacking (CYSE 450)"},"content":{"rendered":"\n<p>This course demonstrates my technical application skills using various tools to understand how vulnerabilities affect systems and networks. <\/p>\n\n\n\n<p><strong>#1: Malware Analysis<\/strong><br><br>In this lab, I analyzed two malware, such as Mirai and VIPkeylogger. This lab strengthened my technical understanding of how malware can give a hacker an advantage to disrupt a system or network without being detected.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Lab-4_-Malware-Analysis-CYSE-450.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Malware Analysis .\"><\/object><a id=\"wp-block-file--media-15073903-f226-42a1-a307-fd4164bb50fe\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Lab-4_-Malware-Analysis-CYSE-450.pdf\">Malware Analysis <\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Lab-4_-Malware-Analysis-CYSE-450.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-15073903-f226-42a1-a307-fd4164bb50fe\">Download<\/a><\/div>\n\n\n\n<p><strong>#2: Passive Reconnaissance\u00a0<\/strong><br><br>In this lab, I conducted passive reconnaissance on a web camera by using the tools Shodan, WHOIS Domain Lookup, and MITRE ATT&amp;CK. This lab taught me to identify potential entry points and vulnerabilities such as privilege escalation, authentication bypass, and remote command injection. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/LAB-2_-Passive-Reconnaissance-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Passive Reconnaissance.\"><\/object><a id=\"wp-block-file--media-6bbdd000-4fa5-49ff-8174-5b83332917d3\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/LAB-2_-Passive-Reconnaissance-.pdf\">Passive Reconnaissance<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/LAB-2_-Passive-Reconnaissance-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6bbdd000-4fa5-49ff-8174-5b83332917d3\">Download<\/a><\/div>\n\n\n\n<p><strong>#3: SQL Injection<\/strong><br><br>In this lab, I executed SQL injections using DVWA, Kali Linux, and Mutillidae. Utilizing sqlmap and SQL injections such as &#8220;cyse-450&#8221;, I was able to bypass authentication to obtain login credentials from the database. Through investigating both applications, I gained an understanding of how to execute and protect against SQL injection attacks. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/LAB-6_-SQL-Injection-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SQL Injection.\"><\/object><a id=\"wp-block-file--media-eeba7fc5-4e06-44e2-9f68-1847b42017a2\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/LAB-6_-SQL-Injection-1-1.pdf\">SQL Injection<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/LAB-6_-SQL-Injection-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-eeba7fc5-4e06-44e2-9f68-1847b42017a2\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course demonstrates my technical application skills using various tools to understand how vulnerabilities affect systems and networks. #1: Malware Analysis In this lab, I analyzed two malware, such as Mirai and VIPkeylogger. This lab strengthened my technical understanding of how malware can give a hacker an advantage to disrupt a system or network without &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/ethical-hacking\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Ethical Hacking (CYSE 450)<\/span><\/a><\/p>\n","protected":false},"author":26014,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/431"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/users\/26014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/comments?post=431"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/431\/revisions"}],"predecessor-version":[{"id":495,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/431\/revisions\/495"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/media?parent=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}