Project 1
I have had many classes where I wished I could have proof of the assignments, such as networking class. However, during my Linux Systems for Cybersecurity CYSE 270, we had a lab that involved hacking users’ passwords. Professor Shobha made those users and passwords. Attempts to retrieve the original plaintext password from its hashed form—usually kept in a database or system—is known as hashing. One-way cryptographic changes called hashes make it challenging to recover the original password directly. However, by identifying a password that produces the same hash, attackers try to “crack” or reverse the hashing process using various strategies. Hence, each student must hack six users through the Linux kernel. I was introduced to the hashing method, which I wanted to learn. There are different methods of hashing, such as brute force attacks. Brute Force attacks are defined as determining the right credentials or decoding the data; the attacker attempts every possible combination of characters or values. I started generating all possible password combinations through the wordlist that Professor Shobha published before the lab. I had to have each password attempt and compare it with the target hash. If they find a match, they have successfully cracked the password. Since we are students, not professionals, we had type MD5, which is considered highly vulnerable. Hence, during that day, I was introduced to a topic I had hoped to learn since day one at ODU because this experience taught me how hackers think. Attack victims and that experience will teach me how to defend my future cybersecurity firm. During the lab, I was introduced to John the Ripper, which is a tool that cyber professionals use to support their word lists or chances of the passwords that users have. The strength of the hashing method and the password security precautions, like salting, determine how easily a password may be cracked using its hash. It is crucial to employ salting, encourage users to choose complex passwords and utilize robust hashing algorithms like bcrypt or Argon2 to defend against these assaults. Since I’m an online student, I had to do the lab at home, and I submitted the lab on Monday, February 12, 2024. People with a passion for cybersecurity would understand how passionate students get when they learn more about password cracking because it is one of the essentials that cyber students need to learn to protect a system. There were many skills, and I was thankful to learn hashing and Linux systems in-depth because the lab took me around 2 – 3 hours, and I explored more commands in Linux. The values, such as working under pressure to crack passwords and trying to get to the final result, were worth it. Since I’m trying to be a network engineer and ethical hacker, these values will reflect in the future because I will test the passwords and see if my future team passwords crack while following the lab and the future technology. Below are some screenshots I took to maintain hard evidence during my experience. In the screenshots, you will find that I cracked 4 passwords out of 6, and I was the grade that I got was %100 (screenshot below). I could crack four passwords out of 6 because of a technical error from the lab setting that affected the session. I selected this lab to show the potential employer that I could work with various operating systems and, regardless, I could complete the assessment. These labs take time, and reaching the end with the required result takes working under pressure and research because lab manuals do not provide step-by-step instructions. I had to configure errors I had to solve at the beginning of the lab. Despite the challenges, I was able to achieve the result. By the way, I did not interact with any classmates because, in CYSE 270, we did not have a group chat, so my classmates and I worked individually. This will fit perfectly in the skills section because cracking passwords and working in Linux is part of skills, and most cybersecurity firms publish that under skills and qualification. Besides, working with Linux will show that ODU has strong cybersecurity fundamentals because it teaches Windows, Linux, Python, and Mac. Hence, if I ever needed to show my skills in a particular operating system, I would be able to resolve the issues.
Project 2
During my Cybersecurity Techniques and Operation, I had an assignment where we practiced hacking ethically. First, I logged in through the ODU virtual machine. If you are looking for a vulnerability, you will need to display the system network, which allows you to scan the network by network mapper, which is owned as the “nmap command.” Since it is a project that involves ethical hacking, Professor Peng did not assign group work; instead, it was an individual project. Hence, I did the assignment by myself, and since there was a manual that did not show step-by-step instructions, it showed the context and objectives. The project took place on the ODU campus, and I had to commute to campus due to the sensitivity of the project, and Professor Peng wanted to see the actual work. Professor Peng’s class was held in person, and part of the class was held online—for instance, specific projects needed to be done on campus. I took the class in the fall semester of 2023. During the project, I took the responsibility from point A to Z, where I had the pleasure of Professor Peng supervising the entire assignment. It took me around 2 – 3 hours to find the vulnerabilities and break through the Windows system. The project gave me the feeling that everyone can break into your system with proper tools. I was frightened by my ability to break the Windows system. I have encountered many skills and values, for instance. This was my first ethical hacking experience, and I had much tension because I had no experience with hacking or coding. The experience gave me the strength to explore more hacking techniques in the future. For instance, instead of hacking through scanning, DDOS attacks overflow the server to get into the system. Besides growing my hacking skills, I learned that being precise with the command line and understanding each command will develop my knowledge. I think this experience will fit under my skills tab because it falls under penetration testing and is more of a skill than a project. In the current world, tech firms are looking for penetration testing and ethical hacking to clarify system vulnerability more than at any time.
Project 3
During my Cybersecurity Technique and Operation class, I had a lab assignment based on networking scanning. The lab was done independently, and each student was supposed to scan the network through a virtual machine. Professor Peng instructed that we use specific IP addresses and by scanning. We get a report that shows the ports that are open or closed. Frequent scanning can mitigate risks, such as vulnerability and configuration scans, identifying known software, hardware, or configuration weaknesses. Addressing these vulnerabilities reduces the attack surface and minimizes potential security risks. Scans detect out-of-date software versions, making it easier to patch systems proactively. Unpatched systems are a significant risk, as attackers often target known vulnerabilities for exploitation. The lab assignment was completed on October 16th, 2023. The experience has brought deep knowledge and was my first experience. The value of the experience can be higher than anyone would think; this lab summarizes the first step of penetration testing. All cybersecurity professionals have started from this step because it can lay out the vulnerabilities of a system. The skills were primarily technical and problem-solving; there were steps that I had to figure out and sometimes search for resources. I think there was adaptability because it is a new tool that helps me to counter recently discovered vulnerabilities. This lab assignment fits perfectly with my future career because it has much potential.
As you can see, these images demonstrate network scanning along with Wireshark scanning. Since I lack experience, this lab could be a great hands-on experience that a potential employer would want to see. Besides that, I have always wanted to learn more about scanning networks or devices.
Project 4
During my CYSE250 Cisco class, we were introduced to Cisco Packet Tracer Simulation. I had to create the networking devices, such as switches and routers, and design internet protocol addresses (IPV4). A teaching and learning tool called Packet Tracer assists users in simulating network phenomena, troubleshooting, and learning networking principles. Students and teachers at Cisco Networking Academy mostly utilize it to learn CCNA fundamentals. A packet is a brief bit of information transmitted via a network, like the internet, and then put back together by the recipient. We were assigned individually in the lab, and my role was to complete the entire lab and show that the system was accepting the packet. With our robust network simulation tool, you can practice networking, IoT, and cybersecurity skills in a virtual lab without needing hardware. In addition to practicing rack, stack, and cabling techniques and visualizing how a network functions, you will also integrate Python code and IoT devices.The lab took place online, and I took this course during the spring semester of 2023. In contrast to other simulations, Packet Tracer stands out for its user-friendly interface, extensive features like “Simulation Mode” to trace packet paths, and ability to closely mimic real Cisco device CLI commands, making the learning process more intuitive and realistic. This lets you learn and practice complex networking concepts in a safe, hands-on environment by visually building and manipulating network topologies. It also allows you to experiment with configurations and troubleshoot issues without risking real hardware. It is especially valuable for beginners or those preparing for networking certifications like CCNA, where understanding packet flow and device configurations is essential. In addition to acquiring fundamental Cisco command line interface (CLI) commands and network design principles, practicing on Cisco Packet Tracer would help you develop important networking skills like comprehending network topologies, configuring basic networking devices (routers, switches), applying IP addressing and subnetting, troubleshooting connectivity issues, analyzing network traffic, putting routing protocols into practice, and visualizing data flow within a network. Flexibility Because network simulation is dynamic, users must modify their plans when they encounter unexpected outcomes or solve network problems. tenacity Using Packet Tracer to build, configure, and debug networks frequently requires trial and error. The importance of persistence is demonstrated by the capacity to remain resolute and keep improving configurations until the network functions as planned. Solving Issues Through diagnosing and resolving intricate network problems in the simulated environment, users hone their analytical and critical thinking abilities. Paying close attention to Details Precise attention to configuration details and the overall architecture is necessary for device configuration and network accuracy. Cooperation and Interaction Since students frequently work together to create and troubleshoot networks, Packet Tracer promotes cooperation and good communication when utilized in group projects or educational settings. Compassion, while not immediately related to the technical components, collaborative work can foster empathy as users learn to support and comprehend the difficulties and viewpoints of their colleagues in resolving network-related issues. Having patience Completing intricate simulations might take a while, especially for novices. Patience is crucial to staying focused and hardworking without getting discouraged by early setbacks. For positions like network engineer, cybersecurity analyst, or IT administrator, a professional’s grasp of networking principles like routing, switching, and network security is strengthened with Packet Tracer. Gaining proficiency with this tool complements the objective of mastering network design and troubleshooting, demonstrating practical knowledge that companies appreciate. Since simulations are dynamic, they must be quickly adjusted when network configurations do not work out. This flexibility transfers to professional roles where unforeseen circumstances and changing technologies require adaptability and innovative responses.A thorough network design that demonstrates how to efficiently establish and scale networks by utilizing numerous routers, switches, VLANs, and subnets. Firewalls, secure device management (such as SSH settings), and access control lists (ACLs) are used to show that network security measures can be prioritized and implemented. Since this kind of intricate, multi-layered network architecture project encompasses many facets of technical development and the usage of fundamental and sophisticated networking skills, I chose it as an artifact. All things taken into account, this project shows that my learning process has been thorough, progressing from basic networking knowledge to intricate, practical applications. It highlights my technical prowess, problem-solving attitude, meticulousness, and teamwork—all noteworthy accomplishments that complement my identity and career objectives. I think this would fit into the skills tab due to the effectiveness of the lab and, most importantly, companies that hire cybersecurity take into consideration CISCO objectives. That lab provided a clear outline of the time I had the opportunity to visit the CISCO packet tracer.