Artifact 1: In this lab, I created shell scripts using the Nano editor and applied various Linux commands to navigate and manage files within the Linux environment. I used commands such as chmod to assign executable permissions to script files and implemented conditional statements to control program flow and automate specific tasks. This lab strengthened my understanding of Linux fundamentals, scripting, and automation, which are essential technical skills in cybersecurity.
Artifact 2: In this lab, I performed SQL injection attacks within a controlled virtual environment using Damn Vulnerable Web Application hosted on a virtual machine alongside Metasploitable2. The objective of the lab was to understand how attackers exploit insecure database queries to gain unauthorized access to sensitive information. Through this exercise, I learned how SQL injection vulnerabilities occur, how malicious queries can manipulate databases, and why secure coding practices and input validation are critical in cybersecurity. This hands-on experience strengthened my understanding of web application security, ethical hacking concepts, and vulnerability assessment techniques.
Artifact 3: In this lab, I created multiple user groups in Linux, including employee, payroll, and admin groups, and assigned file and directory permissions based on their specific job roles and responsibilities. Using Linux user and group management commands, I configured access controls to ensure that each group could only access the resources necessary for their tasks. For example, the payroll group was granted access to sensitive payroll files, while administrative privileges were limited to the admin group. This activity helped me understand the principle of least privilege and the importance of role-based access control in cybersecurity. Through this hands-on experience, I strengthened my knowledge of Linux administration, system security, and access management practices commonly used in real-world organizational environments.