Obligatory, "Hello world!".
This is my first ever webserver. This was initially created to practice securing an Apache webserver, but after creating one, I decided that it looked too bland. So now, I hope to utlize this to display some of my projects I've done (this one being the first one) and also explaing some of the certificates/labs I've completed.
If you're reading this, this project will most likley not be done/always be updated.
This webserver!
I've still got plenty left to learn in HTML, maintaing and securing my own webserver. The steps were simple:
- Install a VM.
- Install Apache2
- Put my HTML skills to the test (please dont look at my code)
- Deploy a VM in Microsoft Azure
- Obtain a domain and update DNS records
- Configure ports to maintain security
Participating in CTF events
I unknowingly went to a CTF event and I very unprepared. No laptop, very little knowledge, but one super hacker helping me out with his knowledge and latop. Thanks Jas lol. After capturing my first flag (SQL injection), I was hooked! At the moment, I am continuing my practice through TryHackMe and PicoCTFs.
Blue Team Level 1 Certification
The Security Blue Team Level 1 certification was the most entertaining course/exam I've taken. This isint a project necessarily, however, it did have plenty of labs and tools I used. It focuses on 5 domains:
- Phishing Analysis
- Threat Intelligence
- Digital Forensics
- Security Information and Event Monitoring (SIEMs)
- Incident Response
Upon purchasing the course, I was provided with multiple labs for each domain, teaching me and giving me expierence with tools that a security analyst/SOC analyst would use. Some of the tools I utilized to complete the labs and test was:
- Nmap
- WireShark
- Splunk
- MITRE ATT&CK Framework
- Volatility framework & Volatility 3 Workbench
- Whois.Domaintools & VirusTotal
- Autopsy
- KAPE
This was a hands-on, 24-hour exam that focused in those 5 domains I mentioned earlier. Some activities I did to help me pass with a 90% (gold coin btw :D) was:
- Manual artifact extraction
- Using Splunk to investigate malicious activites and events
- Threat intelligence research
- Hard drive investigations
- Responding to security incidents
Setting up my own vulnerability scanner
I installed, cusomized and used Tenables Nessus vulnerability scanner. I have not done too much with this tool other thatn running some soft scans on my local network, however I do have future plans utilizing this scanner involoving SIEMs and Nmap.