Templates

Advent of Cyber

Overview


Room URL:
Difficulty:
Category:
Date Completed:

Objective

objective


Table of Contents

Introduction
Walk Through
Lessons Learned
Resources


Introduction

This is an introduction to the room.


Walk Through

This is the walkthrough section


Lessons Learned


Resources

TryHackMe

Vulnerability Write Up

Date: [YYYY-MM-DD] Category: [Penetration Testing / Web Application Security / Network Defense / Threat Analysis / etc.] Tools Used: [Nmap, Metasploit, Wireshark, Burp Suite, Python, etc.] Target/Scope: [Specify target system, application, or network segment]


💡 Executive Summary

A brief, non-technical summary of the project's goal, the most significant findings, and the overall outcome.


🔬 Methodology and Execution

Detail the steps taken, including reconnaissance, scanning, and exploitation phases.

Phase 1: Reconnaissance

Phase 2: Vulnerability Analysis

Phase 3: Proof of Concept (PoC)

Provide the exact steps and evidence (screenshots, code blocks) showing the exploitation.

  1. Step 1: [Action taken]
  2. Step 2: [Action taken, e.g., "Injected the payload: [Payload]"]
  3. Result: [Describe the outcome, e.g., "The browser successfully executed the script."]

Code Block Example (Payload):

<script>alert('XSS Proof of Concept')</script>

✅ Remediation and Mitigation

What steps were recommended or taken to fix the issue?


🧠 Lessons Learned

What did you learn from this project?

Certification or Course Summary

Completion Date: [YYYY-MM-DD] Issuing Body: [CompTIA, Offensive Security, SANS, etc.] Domain Focus: [Network Security, Incident Response, Ethical Hacking, Cloud Security, etc.] Portfolio Value: [High/Medium - Why is this relevant?]


🎯 Key Objectives


🛠️ Core Skills Gained/Refined

Network Security

Security Operations (SecOps)


📚 Significant Project or Lab

Briefly describe the most challenging or informative project/lab undertaken during the course.


🚀 Next Steps

How will you apply this knowledge?

News/Research Summary

🚨 Analyzing the [Specific Event/CVE Title]

Date Published: [YYYY-MM-DD] Topic: [Supply Chain Attack / Critical Vulnerability / Ransomware Trend] CVSS Score (if applicable): [e.g., 9.8 (Critical)]


🌍 What Happened?

A concise, accessible explanation of the event or vulnerability.

Quote/Key Fact: "This vulnerability affects all unpatched versions of the [Software Name] from [Version] onwards, allowing for unauthenticated Remote Code Execution (RCE)."


💥 Technical Details and Impact


🛠️ My Analysis and Mitigation Strategy

What does this mean for a security professional, and how should one respond?

  1. Immediate Action: Patching is critical. Prioritize systems that are [Public-facing / Contain sensitive data].
  2. Detection: Implement IDS/IPS signatures to watch for the exploit payload.
  3. Proactive Defense: Review the Software Bill of Materials (SBOM) to identify exposure to the vulnerable library.

🔮 Looking Forward

What is the long-term lesson?

CTF Writeup

Event/Platform: [Hack The Box / TryHackMe / PicoCTF / Local Event] Date Solved: [YYYY-MM-DD] Category: [Web / Reverse Engineering / Pwn / Crypto / Forensics / Misc] Difficulty: [Easy / Medium / Hard / Insane]


🔍 Initial Discovery and Reconnaissance

How did you first approach the problem?

Code Block Example (Nmap Output):

# nmap -sC -sV [IP]
PORT    STATE SERVICE VERSION
80/tcp  open  http    Apache httpd 2.4.41 ((Ubuntu))
22/tcp  open  ssh     OpenSSH 8.2p1 Ubuntu

🧩 Exploitation Path and Steps

Detail the logical sequence of steps that led to the flag. Break this down into smaller, digestible phases.

Phase 1: Finding the Vulnerability (e.g., Web App)

Phase 2: Gaining Access/Shell

Phase 3: Privilege Escalation (if necessary)


🏆 The Flag

Document the final steps and the flag itself.


🧠 Key Takeaway

What specific technical or problem-solving concept did this challenge reinforce?

HomeLab

Date: [YYYY-MM-DD] Objective: [e.g., Design, build, and secure a virtual environment for malware analysis.] Components: [List major systems, e.g., pfSense Firewall, Kali VM, Windows Server 2022 AD, Splunk SIEM]


🗺️ Architectural Design

Provide a high-level overview (a diagram is best here, mentioned as an image).

Network Topology

[Image of the network diagram/topology]


🛠️ Security Control Implementation

Detail the specific defensive tools and configurations you implemented.

🛡️ Perimeter Defense (pfSense/Firewall)

Control Mechanism Configuration Detail
IDS/IPS Snort/Suricata Configured ruleset for C2 and known exploit detection.
Egress Filtering Firewall Rules Blocking outbound traffic on non-standard ports (e.g., 25, 139, 445).
VPN Access OpenVPN Enforced 2FA and strong cryptography ($AES-256-GCM$).

📊 Monitoring & Logging (SIEM)


📈 Testing and Validation

How did you ensure the defenses were working?


📚 Technical Learnings

THM Template

Overview


Room URL: [Room URL]
Difficulty: [Easy/Medium/Hard]
Category: [Category]
Date Completed: [Date]

Objective

[Brief description of what the room teaches and the main goals]


Table of Contents

Introduction
Walk Through
Lessons Learned
Resources


Introduction

[Main Concept/Topic]

[Brief overview of what this topic is about]

Why This Matters

[Explain the real-world relevance and importance of this technique/concept]


Method/Technique 1: [Name]

What is it?
[Explanation of the concept]

Purpose:
[Why this technique is used]

Tool/Method:
[Specific tools or approaches used]

How it Works:
[Step-by-step explanation of the methodology]


Method/Technique 2: [Name]

What is it?
[Explanation of the concept]

Why [Relevant Question]?
[Explanation]

Common Tools:

How it Works:
[Step-by-step explanation of the methodology]


Method/Technique 3: [Name]

What is it?
[Explanation of the concept]

Tools:
[Description of tools and their capabilities]


Method/Technique 4: [Name]

The Concept:
[Explanation of core concept]

Where/How [Relevant Detail]:

The Attack Method:
[Explanation of how to exploit/use this]

Tool: [Tool Name]

[Brief description of the tool]

Basic Syntax:

[command syntax]

Key Flags/Options:

Important Considerations:
[Any caveats, filtering needs, or special notes]


Walk Through

Task 1: [Task Name]

[Step-by-step instructions]

  1. [Step 1]
  2. [Step 2]
  3. [Step 3]

Answer: [answer]


Task 2: [Task Name]

[Step-by-step instructions]

  1. [Step 1]
  2. [Step 2]
  3. [Step 3]

Answer: [answer]


Task 3: [Task Name]

[Step-by-step instructions]

  1. [Step 1]
  2. [Step 2]
  3. [Step 3]

Answer: [answer]


Task 4: [Task Name]

Step 1: [Sub-step Name]

[command]

Step 2: [Sub-step Name]

[command]

Answers:
[Question 1]: [answer]
[Question 2]: [answer]


Lessons Learned


Resources

TryHackMe
Resource 1 - Description
Resource 2 - Description
Resource 3 - Description
Resource 4 - Description
Resource 5 - Description
Resource 6 - Description

Resume

David Rizzo

Cybersecurity Graduate • IT & Digital Forensics


Contact


Summary

IT and cybersecurity professional with a strong foundation in technical support, system operations, and security principles. Experienced in troubleshooting, incident analysis, and maintaining reliable computing environments across Windows, Linux, and cloud platforms. Known for combining technical problem-solving with leadership, customer service, and clear communication in fast-paced environments.


Skills

IT & Systems

Technical Support, Troubleshooting, System Monitoring, Windows & Linux Administration

Security

Security Operations, Vulnerability Assessment, IAM, Cryptography, Log Analysis

Tools

Wireshark, Splunk, Burp Suite, Magnet AXIOM, FTK Imager, Docker

Platforms

Windows, Linux (Kali, Ubuntu, Red Hat), macOS, AWS, Azure


Education

Bachelor of Science in Cybersecurity

Wilmington University — New Castle, DE
Concentration: Digital Forensics

Certificate in Cybersecurity & FinTech

Wilmington University

Cybersecurity Certificate (24-Week Program)

University of North Carolina at Charlotte


Experience

Customer Service & Team Leadership

Lowe's — Concord, NC | 2020–2025

Videographer / Media Support

Mecklenburg Community Church — Charlotte, NC | 2019–2020


Selected Technical Projects

Digital Forensics Investigation

Evidence acquisition, artifact analysis, and formal reporting

Red Team / Blue Team Lab

Simulated attacks and defensive monitoring using Kali & ELK

Azure ELK Stack

Centralized logging, dashboards, and incident response