{"id":273,"date":"2025-10-17T01:21:52","date_gmt":"2025-10-17T01:21:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dtibb002\/?page_id=273"},"modified":"2025-12-05T23:02:00","modified_gmt":"2025-12-05T23:02:00","slug":"projects","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dtibb002\/projects\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>This portion includes my skills in ethical hacking. It shows different kinds of attacks used in real-world scenarios and how they work.<\/p>\n\n\n\n<ol>\n<li><strong>Here is a program I used to showcase a phishing attack, more specifically a website cloner to steal users credentials.<\/strong><\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1006\" height=\"852\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-174815.png\" alt=\"\" class=\"wp-image-288 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-174815.png 1006w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-174815-300x254.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-174815-768x650.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-174815-600x508.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-174815-945x800.png 945w\" sizes=\"(max-width: 1006px) 100vw, 1006px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This program is called &#8220;setoolkit&#8221;, it is designed to do all sorts of attacks. From spear-phishing attacks, to PowerShell attacks, to mass mailer attacks.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"927\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192725-1024x927.png\" alt=\"\" class=\"wp-image-289 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192725-1024x927.png 1024w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192725-300x272.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192725-768x695.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192725-600x543.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192725-945x855.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192725.png 1138w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is the victim site I used for the phishing attack. It has a username field and password field users can type into to login. <\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"915\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192934-1024x915.png\" alt=\"\" class=\"wp-image-290 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192934-1024x915.png 1024w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192934-300x268.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192934-768x686.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192934-600x536.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192934-945x845.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192934.png 1149w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>As you can see here, the program was able to clone the victim site perfectly, so that when users login with their credentials, it redirects them to the real site, but in the backend, the credentials was sent to me.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1006\" height=\"856\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192907.png\" alt=\"\" class=\"wp-image-291 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192907.png 1006w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192907-300x255.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192907-768x653.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192907-600x511.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-192907-945x804.png 945w\" sizes=\"(max-width: 1006px) 100vw, 1006px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>As you can see in the red text, I now have the users username and password credentials, which allows me to use their login to the real site and gain access to sensitive information.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>2. Here is me showcasing a password cracking software in action.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1006\" height=\"847\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201324.png\" alt=\"\" class=\"wp-image-292 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201324.png 1006w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201324-300x253.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201324-768x647.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201324-600x505.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201324-945x796.png 945w\" sizes=\"(max-width: 1006px) 100vw, 1006px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This program is &#8220;John the Ripper&#8221;. It is a password cracking program. Here, you can see me use John to find out the password hash of the zipped file.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"643\" height=\"513\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201456.png\" alt=\"\" class=\"wp-image-293 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201456.png 643w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201456-300x239.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-201456-600x479.png 600w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is the text file John created that shows the password hash.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"847\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-203514.png\" alt=\"\" class=\"wp-image-294 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-203514.png 1000w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-203514-300x254.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-203514-768x650.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-203514-600x508.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-18-203514-945x800.png 945w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>After entering the hash text file to John, it then cracked the zipped file to showcase the password, which is in the orange text.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>3. Here is me showcasing a SQL injection<\/strong><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"737\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203858-1024x737.png\" alt=\"\" class=\"wp-image-309 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203858-1024x737.png 1024w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203858-300x216.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203858-768x553.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203858-600x432.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203858-945x680.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203858.png 1246w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is the target website, which displays a login field for authenticated users. I inputted  the wrong username and password on purpose for this example. <\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"587\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203838-1024x587.png\" alt=\"\" class=\"wp-image-311 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203838-1024x587.png 1024w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203838-300x172.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203838-768x440.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203838-1536x880.png 1536w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203838-600x344.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203838-945x541.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-203838.png 1594w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is the program Burp Suite. It tracks the requests sent to the target website and intercepts them. In the highlighted part, it shows what I put in. This is where I can input the SQL injection to then gain access to the website. Since I don&#8217;t have permission to do this, I can&#8217;t show me gaining access. <\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>This portion includes my skills in networking, such as scanning IP&#8217;s and tracing packets sent across my network.  <\/p>\n\n\n\n<p><strong>1. Here is me showcasing online devices on my network.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"532\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-191653-1024x532.png\" alt=\"\" class=\"wp-image-312 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-191653-1024x532.png 1024w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-191653-300x156.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-191653-768x399.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-191653-600x312.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-191653-945x491.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-191653.png 1339w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is a program called Angry IP Scanner. It pinged all devices connected on my network and shows which devices responded to the ping. It also shows which ports are open. It also allows me to search other IP&#8217;s across the world and see what devices are online.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>2. Here is me showcasing packets being sniffed through my network.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"619\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-205752-1024x619.png\" alt=\"\" class=\"wp-image-314 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-205752-1024x619.png 1024w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-205752-300x181.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-205752-768x464.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-205752-600x363.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-205752-945x571.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-205752.png 1146w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Here is a website that uses the HTTP protocol. I have entered a random username and password in the login field.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"745\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-194134-1024x745.png\" alt=\"\" class=\"wp-image-313 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-194134-1024x745.png 1024w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-194134-300x218.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-194134-768x559.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-194134-600x437.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-194134-945x688.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-194134.png 1171w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is a program called Wireshark. I used it to sniff packets coming in through my network. As you can see, it caught the packet when I clicked the login button on the website. In the HTML Form field, it shows the username and password I entered. This is why modern websites use the HTTPS protocol, that way packets can&#8217;t be as easily sniffed.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>3. Here is me showcasing how to spot vulnerabilities in your network.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1005\" height=\"471\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-202052.png\" alt=\"\" class=\"wp-image-315 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-202052.png 1005w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-202052-300x141.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-202052-768x360.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-202052-600x281.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-202052-945x443.png 945w\" sizes=\"(max-width: 1005px) 100vw, 1005px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is a program called Nmap. Here, I used a command that scanned my network to see if their were any vulnerabilities. As you can see, it shows that it couldn&#8217;t spot any vulnerabilities in my network. If I were to use this in a bigger setting like a corporate office, I could easily spot more vulnerabilities in the network, which then allows me to exploit them.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>This portion shows my skills in coding Python, which includes different attacks on systems and basic programming.<\/p>\n\n\n\n<p><strong>1. Here is a Python script that serves as a Denial of Service attack.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"631\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-29-213017-1.png\" alt=\"\" class=\"wp-image-304 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-29-213017-1.png 886w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-29-213017-1-300x214.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-29-213017-1-768x547.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/11\/Screenshot-2025-11-29-213017-1-600x427.png 600w\" sizes=\"(max-width: 886px) 100vw, 886px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>When the victim website is linked in the target value, the website will be flooded and overwhelmed with traffic, making it unavailable for users until the traffic gets filtered out.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>2. Here is a Python script that can shutdown any computer connected to a network.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"172\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-11-29-213152.png\" alt=\"\" class=\"wp-image-316 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-11-29-213152.png 732w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-11-29-213152-300x70.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-11-29-213152-600x141.png 600w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This simple Python script allows me to shutdown any computer connected to a network. I can do this by using the ARP -a command, which then shows me a list of IP addresses connected to the network, which then I input into the script.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>3. Here is a database I created in Python.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"780\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211529-1024x780.png\" alt=\"\" class=\"wp-image-317 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211529-1024x780.png 1024w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211529-300x229.png 300w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211529-768x585.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211529-600x457.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211529-945x720.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211529.png 1525w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>This is a car database I created using Python. The script works by creating rows of information about a car in someone&#8217;s dealership. You can also update and delete rows.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1008\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211551-1008x1024.png\" alt=\"\" class=\"wp-image-318 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211551-1008x1024.png 1008w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211551-295x300.png 295w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211551-768x780.png 768w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211551-600x609.png 600w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211551-945x960.png 945w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211551.png 1144w\" sizes=\"(max-width: 1008px) 100vw, 1008px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>It includes information such as the year, make, model, drivetrain, transmission, and price.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"759\" height=\"991\" src=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211622.png\" alt=\"\" class=\"wp-image-319 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211622.png 759w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211622-230x300.png 230w, https:\/\/sites.wp.odu.edu\/dtibb002\/wp-content\/uploads\/sites\/38243\/2025\/12\/Screenshot-2025-12-04-211622-600x783.png 600w\" sizes=\"(max-width: 759px) 100vw, 759px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>When someone wants to retrieve the information about a certain car, you just search the model in the database, and it pulls up all the information about the car.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This portion includes my skills in ethical hacking. It shows different kinds of attacks used in real-world scenarios and how they work. This program is called &#8220;setoolkit&#8221;, it is designed to do all sorts of attacks. From spear-phishing attacks, to&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/dtibb002\/projects\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30326,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-json\/wp\/v2\/pages\/273"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-json\/wp\/v2\/users\/30326"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-json\/wp\/v2\/comments?post=273"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-json\/wp\/v2\/pages\/273\/revisions"}],"predecessor-version":[{"id":325,"href":"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-json\/wp\/v2\/pages\/273\/revisions\/325"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dtibb002\/wp-json\/wp\/v2\/media?parent=273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}