Have I Been Pwned? Offline Project

Project Overview: For my final project in the Northwestern Cybersecurity Bootcamp, I developed an offline version of the popular “Have I Been Pwned?” service. This tool allows users to check if their passwords have been compromised without needing an internet connection. Project Components: Docker Integration Database Management Automated Updates User Interaction Security and Efficiency This …

Three-Day Cybersecurity Challenge

Project Overview: In an intensive three-day cybersecurity challenge, I engaged in a series of complex penetration tests across various platforms including web applications, Linux containers, and Windows systems. This multi-faceted challenge was designed to test and enhance my capabilities in identifying and exploiting vulnerabilities across different environments. Day 1: Web Application Vulnerability Exploitation I started …

Web Application Penetration Testing Project

Project Overview: In a series three days, I focused on identifying and exploiting vulnerabilities in web applications to enhance their security posture. These projects included a Web Application Penetration Testing exercise and a thrilling Capture the Flag (CTF) event, both designed to test and refine my skills in penetration testing, vulnerability analysis, and problem-solving. Objectives: …

Azure Cloud Architecture Project: Secure Web Application Deployment

Project Overview: In this comprehensive project, I designed and implemented a secure, scalable web application architecture using Microsoft Azure. The architecture leveraged a jump box provisioner with Ansible for automated configuration management, ensuring efficient and consistent deployment of Docker containers across multiple web servers. Architecture Details: Security and Efficiency: This architecture not only ensured that …

Scavenger Hunt: A Cybersecurity Adventure

Project Overview: Engaging in the scavenger hunt was an exhilarating experience that tested my cybersecurity problem-solving skills and penetration testing abilities. Each task was a puzzle that required ingenuity, patience, and a keen eye for detail, reflecting real-world scenarios that security professionals encounter. Discovering Hidden Files: The first task was to find hidden files containing …