{"id":558,"date":"2026-05-04T20:55:16","date_gmt":"2026-05-04T20:55:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rchakma24\/?page_id=558"},"modified":"2026-05-05T16:33:21","modified_gmt":"2026-05-05T16:33:21","slug":"technical","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/rchakma24\/technical\/","title":{"rendered":"Technical"},"content":{"rendered":"\n<p><strong>Artifact 1:<\/strong> In this lab, I created shell scripts using the Nano editor and applied various Linux commands to navigate and manage files within the Linux environment. I used commands such as chmod to assign executable permissions to script files and implemented conditional statements to control program flow and automate specific tasks. This lab strengthened my understanding of Linux fundamentals, scripting, and automation, which are essential technical skills in cybersecurity.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/chakma_Assgnt^N8-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of chakma_Assgnt^N8-1.\"><\/object><a id=\"wp-block-file--media-8dba2b17-8353-40c3-898c-779f3dd4f10b\" href=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/chakma_Assgnt^N8-1.pdf\">chakma_Assgnt^N8-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/chakma_Assgnt^N8-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8dba2b17-8353-40c3-898c-779f3dd4f10b\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact 2: <\/strong>In this lab, I performed SQL injection attacks within a controlled virtual environment using Damn Vulnerable Web Application hosted on a virtual machine alongside Metasploitable2. The objective of the lab was to understand how attackers exploit insecure database queries to gain unauthorized access to sensitive information. Through this exercise, I learned how SQL injection vulnerabilities occur, how malicious queries can manipulate databases, and why secure coding practices and input validation are critical in cybersecurity. This hands-on experience strengthened my understanding of web application security, ethical hacking concepts, and vulnerability assessment techniques.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/Chakma_Lab6.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Chakma_Lab6.\"><\/object><a id=\"wp-block-file--media-ebd0c5f7-49e9-430f-bd89-8ed549e50de5\" href=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/Chakma_Lab6.pdf\">Chakma_Lab6<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/Chakma_Lab6.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ebd0c5f7-49e9-430f-bd89-8ed549e50de5\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact 3:<\/strong> In this lab, I created multiple user groups in Linux, including employee, payroll, and admin groups, and assigned file and directory permissions based on their specific job roles and responsibilities. Using Linux user and group management commands, I configured access controls to ensure that each group could only access the resources necessary for their tasks. For example, the payroll group was granted access to sensitive payroll files, while administrative privileges were limited to the admin group. This activity helped me understand the principle of least privilege and the importance of role-based access control in cybersecurity. Through this hands-on experience, I strengthened my knowledge of Linux administration, system security, and access management practices commonly used in real-world organizational environments.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/chakma_Assgnt6-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of chakma_Assgnt6-1.\"><\/object><a id=\"wp-block-file--media-6dbbb2a6-531f-4ecb-a140-4cd2683ce2e0\" href=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/chakma_Assgnt6-1.pdf\">chakma_Assgnt6-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-content\/uploads\/sites\/37202\/2026\/05\/chakma_Assgnt6-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6dbbb2a6-531f-4ecb-a140-4cd2683ce2e0\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Artifact 1: In this lab, I created shell scripts using the Nano editor and applied various Linux commands to navigate and manage files within the Linux environment. I used commands such as chmod to assign executable permissions to script files and implemented conditional statements to control program flow and automate specific tasks. This lab strengthened&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rchakma24\/technical\/\">Read More<\/a><\/div>\n","protected":false},"author":29760,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-json\/wp\/v2\/pages\/558"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-json\/wp\/v2\/users\/29760"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-json\/wp\/v2\/comments?post=558"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-json\/wp\/v2\/pages\/558\/revisions"}],"predecessor-version":[{"id":607,"href":"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-json\/wp\/v2\/pages\/558\/revisions\/607"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rchakma24\/wp-json\/wp\/v2\/media?parent=558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}