Skip to content

leambeam/cybersecurity

Repository files navigation

Ethical Hacking

This GitHub repository showcases completed courses and assignments from the Ethical Hacking module.

Environment

Two separate environments were used for different courses: one for the CTF course and another for the remaining courses.

CTF

  • Kali - Attacking machine.
  • Linux_1 - File storage.
  • R_1 - VyOS router.
  • Win_1 - Jeff's machine.
  • Win_2 - Lisa's machine.

For additional details, refer to the CTF report.

Ethical hacking

  • Flare-VM - Malware analysis machine that was used in the last two Reverse Engineering labs.
  • Kali - Attacking machine that was used in Web Application Security and Software Exploitation. Was also used for most of the Reverse Engineering labs.
  • Pfsense - Firewall.
  • Wasdat - Web server hosting vulnerable applications for Web Application Security exercises.

For additional details, refer to the Audit report.

This course focused on exploring, exploiting, and addressing common vulnerabilities in web applications, aligning with the OWASP TOP 10 2021.

Used tools

Reports

Structured with eight challenges, some featuring multiple parts, the CTF course aimed at uncovering concealed flags. The difficulty level progressed sequentially throughout the course.

Used tools

Report

CTF report

The Software Exploitation course featured diverse challenges, concentrating on exploits like buffer overflow, shellcode, and format string exploits within C-based programs.

Used tools

Reports

In the Reverse Engineering course, assignments revolved around analyzing disassembled compiled programs to find hidden passwords or flags. The last two assignments specifically dealt with real-world examples of malware.

Used tools

Reports

Post-quantum cryptography article

An article in which I attempted to explore the current state of cryptography, quantum computers, their potential risks, and the emerging field of post-quantum cryptography (PQC).

Used tools

IEEE Xplore

Article

PQC

VLE environment audit

I examined the security of the virtual learning environment (VLE) used in the aforementioned cybersecurity courses to provide insights into its current state.

Used tools

Report

Audit