Wireshark Basic Network Security Analysis

Skills: Wireshark, Analysis, Decryption, Encryption

What’s this?

This hands-on experience involved capturing and analyzing network traffic, decrypting passwords, and dissecting RADIUS, telnet, DNS, http, and Https . With this knowledge of Wireshark but also gained a deeper understanding of how these security measures contribute to a security posture.

Why this?

Why this.? As an entry-level security analyst I want to complete project that immersed me in the network security.  Wireshark’s open source status makes it widely use. Adding to my prior shows for Wireshark regarding packet capture I wanted to show that I may follow through with gathering information for escalation or assisting in network administration. 

Packet capture with Wireshark

Skills practiced : Monitoring Network traffic, Linux

What’s this?

A packet capture from ethernet port 80, the use of display filters, saving the captures, and reviewing a handshake with TCP protocol.

Why this?

Proficiency in Network Monitoring, Intrusion Detection and Prevention, and Incident Response, require packet sniffing techniques. Possessing a foundational understanding of network handshakes, contribute essential knowledge to enhance the effectiveness of these functions. 

Leave a Reply

Algorithm for file updates in Python

Skills: Python Automation, Access Control

What’s this?

This project  delves into essential steps and commands required for automation within Python. The demonstration includes conversions, loop structures, understanding of conditional statements, and highlights an effective use of iterative statements. In addition, as part of this project, we initiated the development of an algorithm providing the foundation for controlling access to content. This algorithm proves instrumental in ensuring compliance, security, and an updated access list.

Why this?

The applications of automation in Information security are diverse and impactful. From access control to attack surface management to network security, monitoring, and incident response, its resourcefulness is clear. This project serves as a testament to my foundational skills, demonstrating foundational knowledge in scripting, patch management, and various components essential for fortifying a robust security posture.

Open the file that contains the allow list.
Read the file contents.
Convert the string into a list
Iterate through the remove list
Remove IP addresses that are on the remove list

Leave a Reply

Install using Bash and APT in Linux

Skills: Linux

What’s this?

Installing software on Linux involves using APT, a software manager. I will utilize APT to install Suricata and TCPdump, both of which play a crucial role in monitoring and enhancing security

Why this?

This project aims to demonstrate my proficiency with Linux and its fundamental capabilities. Moving forward, I intend to highlight more advanced elements to further showcase my skills.

Leave a Reply