EDUCATION
University of Portsmouth, Portsmouth, United Kingdom
MSc Cybersecurity and Forensic information Technology 2023 - 2024
- Computer and Mobile Forensic Investigation & Cryptography: Conducted investigations using FTK, Autopsy, and Magnet Axiom, and presented a comprehensive report in court regarding the findings from the seizure. Good understanding of cryptographic controls (symmetric, asymmetric, and hashing algorithms) and various protocol analyses, including OSI, TCP, and IP models
- Investigated and analysed security incidents to identify root causes and implement measures to prevent future occurrences using Wireshark
- Developed knowledge in risk management, security strategies, and access control. Familiar with conducting risk assessments on critical systems, identifying and prioritizing security risks, and recommending mitigation strategies to reduce overall organizational risk.
- Systems, Security and Hacking: Conducted vulnerability scans using Tenable Nessus, Acunetix and penetration tests through Nmap, Hydra, Metasploit, Netcat, and SQL-Map
- Cloud Computing: Implemented Virtualization (Virtual Box) using an Open Nebula to set the cloud infrastructure for users to have internal connectivity and also to the outside world (Project Link)
- Actively stayed up-to-date with the latest security trends and technologies by attending industry conferences, webinars, and training sessions to enhance knowledge of emerging threats and develop the skills needed to mitigate them
- Certified Ethical-Hacking (CEH) in progress
Masters Dissertation: Conducted empirical and data analysis, along with manual source code review, to identify vulnerabilities in WordPress plugin’s. Utilized Bash scripting to scrape website data for comprehensive analysis. The objective was to assess recurring patterns in vulnerability disclosures within WordPress plugins. Based on the findings, strategic recommendations were proposed to strengthen plugin security. Additionally, future research will explore the application of machine learning techniques, including linear regression and random forest models, to predict and mitigate potential vulnerabilities
Skills:
- PLATFORMS: Linux Distribution (Ubuntu, Kali Linux, and Parrot Security OS), Windows (7,10,11,Server2008)
- VIRTUALIZATION: Virtual Box, WEB APPLICATION: WEB Server (Apache)
- EXPLOITATION FRAMEWORK: Metasploit, Social-Engineer Toolkit ( SET )
- PROTOCOLS: TCP/IP, UDP, SSH, TELNET, HTTP, HTTPS, DNS, SMTP, FTP, RDP, SNMP, Net Bios
- PASSWORD CRACK: Hydra, Medusa, John the Ripper
- PORT/VULNERABILITY SCANNING: Nmap / Nessus, OpenVAS, NSE
- SNIFFING TOOL: Wireshark, Ettercap, ArpSpoof
- FORENSIC TOOLS: FTK, Autopsy, Cellebrite, Magnet Axiom, XAMN
- SOFTWARE FIREWALL: IP Tables, Windows Firewall IDS: NIDS, HIDS | Honeypots
- DATABASE SECURITY: SQL Injection (SQL-Map, JSQL)
- WEB APPLICATION TESTING TOOLS: Tenable Nessus, Acunetix, OWASP ZAP, Burp Suite