I am currently in the third year of attaining my bachelor's degree. The ever-evolving nature of cyber security deeply fascinates me. I love learning about the new ways something/someone can be protected. I also like to write blog posts, which can include guides, reviews or anything I want to give my thoughts on.
Cyber security aside, I also like design and creation. I had ideas I wanted to bring to life which lead me to learning web development as well. Hence the creation of this personal website. Moreover, I was also briefly interested in graphic design. For 2 years, I sold several of my designs. These commissions included thumbnails, profile pictures and banner art.
Outside of work, I love reading books. I also like watching movies, playing video games, and ranting about why Firefox is superior to Chromium based browsers.
A case study primarily revolving around the analysis of hexdumps to recover hidden files. Individual bytes were examined to locate and restore any files that might otherwise have remained undetected. An examination of the file image structure is also performed , to inspect specific clusters and sectors. Doing so reveals the path to the root directory. Provides a comprehensive understanding of DFIR.
Involves setting up a secure root Certificate Authority (CA) server on a hardened virtual machine. The root CA will be used to sign SSL certificates to ensure secure communication. The project covers the full process, from initial VM hardening and CA setup to SSL certificate signing, providing a comprehensive look at digital security implementation.
Showcasing the capabilities of Elasticsearch, Logstash, and Kibana in managing, processing, and visualizing data. Raw data in .CSV files are ingested through pipelines and are made into beautiful visualizations. These visualizations provided insight and comparisons between normal vs malicious traffic.