Advanced Search
Search Results
178 total results found
TryHackMe
This compilation documents my hands-on engagement with various cybersecurity domains through the TryHackMe (THM) platform. This bookstack is a record of successful penetration tests, defensive exercises, and deep dives into critical security topics, demonstrat...
Wilmington University
This collection is the culmination of hands-on projects and capstone assignments completed during my Bachelor of Science in Cybersecurity. It is not merely an academic record, but a direct and tangible demonstration of technical proficiency across the critical...
UNC Charlotte
This bookstack serves as the definitive project portfolio from my intensive, full-stack UNCC Cybersecurity Bootcamp. It is a testament to the accelerated, hands-on learning environment, showcasing a rapid acquisition of highly sought-after, job-ready technical...
Nexora Dynamics
This book compiles the "Nexora Dynamics Investigation – Final Report" (Case ND-2025-02-03-001), serving as a comprehensive, simulated case study in incident response (IR) and forensic analysis. This report documents the full lifecycle of a significant security...
Nexora Dynamics Investigation – Final Report
Case Details Case Number: ND-2025-02-03-001 Investigator Name: David Rizzo Date: March 2, 2025 1. Executive Summary Nexora Dynamics, a medium-sized engineering services firm, experienced a significant security breach. The attack began with a successful s...
Notes
CIO Company Address
CIO Update Network Issues - Slowdowns - Webpages taking forever to load - Difficulty accessing services or complete downtime - servers randomly crashing & rebooting without any clear Explanation - Spike in network traffic & bandwitdth - Infastructure strain - ...
Introduction to Advanced Persistent Threats
Email from John Carter to Fellow IT Team Potential Cyber Threat Actors responsible for the attack impacting Nexora Dynamics APT - Sophisticated Cyebr Attackers that operate golablly each with their own targets tools and motivations Four Groups: APT 33 - Elfin ...
Equipment
Key Infastructure Imacated, Integral to both inertnal operationbs and external system delivery Web Server puiblic facing application Substancial delays in response times and service availablitlity to to abnormla traffic volumes Increase page load times and int...
Interviews
Sarah About - Employee - Describes challanges she has recently faces with Nexora network and web server. Notes - Network Slow - Affects productivity - Tasks such as sending and email or accessing files take longer than they should - Webserver was working one ...
Docs
Threat Actor Email
From: John Carter (IT Supervisor) To: Sarah Barnes (System Administrator), Lisa Reynolds (Network Administrator) CC: IT Security Team Hi Sarah, Lisa, Thank you both for all the hard work in getting to the bottom of this incident. Given the indicators we’ve fou...
Equipment Email
All, Just wanted to report on the list of IT equipment impacted by the recent network issues, including make, model, and serial numbers for each. Please review the details below and let me know if any additional information is required for troubleshooting. We...
Attack Symptoms
Email 1: From Lisa Reynolds (Network Administrator) to John Carter Subject: Urgent: Network Slowdown and Unusual Traffic Hi John, We’re seeing major slowdowns across multiple systems. I’ve received reports from both users and monitoring tools. It looks like th...
Company Info
Company Name: Nexora Dynamics Industry: Engineering Services Company Size: Medium-sized enterprise (250-500 employees) Headquarters: Baltimore, MD Established: 2008 Company Overview: Nexora Dynamics is a leading provider of cutting-edge engineering services, s...
National Cyber League
This volume documents my practical performance in the National Cyber League (NCL) Competition, a premier, scenario-based cybersecurity event that mirrors challenges faced in the professional workforce. It serves as a verifiable extension of my NCL Scouting Rep...
Cryptography
Tools Used RapidTables https://www.rapidtables.com/web/tools/index.html Base64 Binary Hex String Cryptii https://cryptii.com/ Decode Decode https://www.dcode.fr/ RSA Cipher Kali Linux Strings Challange 1 Using rapidtables I was able to decode ...
Individual Game Technical Writeup
Table of Contents Introduction Open Source Intelligence (OSINT) Cryptography Password Cracking Log Analysis Network Traffic Analysis Forensics Scanning & Reconnaissance HMAC Integrity Verification Conclusion Introduction This document provides a technical an...