
Ethical Hacker HQ


Exploit Showcase
Smart Home Automation & Security System
I developed a Smart Home Automation and Security System by designing the initial prototype in Tinkercad, building the hardware using a Tech Core Kit, and programming the functionality within the Arduino IDE. This innovative system integrates various devices to monitor and secure a home, enhancing both convenience and safety.
The system features a door monitoring sensor that utilizes a distance sensor to determine whether a door is open or closed. This functionality provides real-time updates and enhances security by detecting potential intrusions. Additionally, the system includes automated lighting, which dynamically activates when the surrounding environment becomes dark, ensuring improved visibility and energy efficiency.
The Smart Home System is modular, allowing for the integration of additional components such as motion detectors, temperature sensors, and smart power outlets to expand its functionality. This project demonstrates my expertise in prototyping, hardware assembly, and programming, as well as my ability to develop practical solutions for real-world applications in home automation and security.
Python Programming with Data
Data is proliferating at an exponential rate. Utilizing a cloud-centric system, this project acquires data related to temperature and humidity. Subsequently, the collected data undergoes analysis through programming and data analytics. This project was created with Anaconda's IDE Spyder and Microsoft Excel. In order to blueprint the project's structure, a flowchart was produced. The code was created to retrieve a collection of weather observations. This dataset was stored within a local database, organized into a table to facilitate subsequent analysis. The database was queried and the results were viewed using SQL. Numerous plots were generated to explore humidity and temperature trends. Subsequently, data analysis led to a predictive inference. The essential concepts of data-oriented programming were explored in this project, wherein data obtained from a cloud service was leveraged for conducting data analytics tasks.
Creating a Multi-Stoplight Circuit
By utilizing Arduino circuits and components, I was able to successfully create a multi-stoplight circuit. This circuit included a push button, buzzer, motion sensor, and LCD display for a pedestrian crosswalk. Finally, the last component was to integrate an emergency signal to complete the traffic intersection circuit. Projects like this multi-traffic light system have helped me gain a hands-on understanding of these skills. This information is valuable for careers involving software development, embedded systems, electronic engineering, as well as other related fields. This project showcased problem-solving abilities and a practical application of theoretical knowledge.
Cybersecurity Strategies:
An Exploration of Security Measures in the Digital Landscape
In today's dynamic digital environment, cybersecurity comprehension goes beyond being a mere skill—it's a vital imperative. In this presentation I will delve into the core principles, strategies, and practical applications of cybersecurity. In conclusion, cybersecurity awareness emerges as a vital skill in the digital age, serving as the cornerstone of our collective defense against evolving cyber threats. The landscape of digital security is dynamic, requiring not only initial understanding but a commitment to continuous learning. As we've explored, maintaining a proactive defensive posture is not just advisable but necessary for adapting to the relentless pace of technological advancements.
Fundamental Physics: Exploring Core Principles Through Hands-On Experiments
This PowerPoint presentation delves into fundamental physics concepts through a series of meticulously designed experiments:
-
Precision of the Ultrasonic Sensor
Evaluates the accuracy and reliability of an ultrasonic sensor by analyzing the consistency of measured distances against established benchmarks. -
Gravitational Acceleration of a Free-Falling Object
Determines the acceleration due to gravity by systematically timing the descent of an object from a known height, providing empirical data on gravitational acceleration. -
Conservation of Energy in a Free-Falling Object
Examines the conversion of potential energy to kinetic energy during free fall, thereby validating the principle of energy conservation through experimental observation. -
Relationship Between Linear and Rotational Motion
Investigates the interrelationship between linear and rotational dynamics by analyzing how rotational motion influences linear movement in various contexts. -
Observing the Hall Effect
Analyzes the Hall Effect by measuring the voltage induced in a conductor subjected to a magnetic field, offering insights into the behavior of charge carriers within a magnetic context.
These experiments collectively enhance our understanding of core physical principles, bridging theoretical models with practical, empirical evidence.
Tactical Cyber Defense
This project represents the culmination of SEC290: Fundamentals of Infrastructure Security, where I applied hands-on techniques to secure, analyze, and evaluate modern IT systems. Delivered as a professional PowerPoint presentation, the project compiles multiple security labs, each designed to simulate real-world scenarios involving threats, vulnerabilities, and defense strategies.
The presentation begins with manual vulnerability assessment, using tools like nbtscan and nmap to identify legacy systems and validate critical exploits such as MS08-067 and MS17-010. Intrusion detection was a major focus, where I configured Snort rules and analyzed network traffic with Wireshark to identify stealth scans, ICMP reconnaissance, and encrypted SSL sessions.
In later modules, I implemented and validated time-based firewall rules and conducted live memory forensics using tools like Volatility, Process Monitor, and Process Hacker. I also configured and tested SSL/TLS encryption, capturing and decrypting packet flows to confirm protocol negotiation and content security.
Each module was supported by screenshots, CLI outputs, and packet captures, all annotated and explained within the final presentation. The project demonstrates my ability to analyze system behavior, detect threats, and implement layered security controls across Linux and Windows environments.
Through this capstone experience, I strengthened my technical proficiency in threat detection, firewall configuration, vulnerability scanning, memory analysis, and protocol dissection. It reflects my readiness for entry-level roles in cybersecurity and infrastructure defense, with a portfolio that showcases both foundational knowledge and practical application.
Linux Operating System
For my Linux Operating System Project, I explored the functionality, versatility, and applications of Linux, one of the most widely used operating systems for corporate servers and ethical hacking.
Linux is an open-source operating system and kernel distributed under the GNU General Public License, allowing users to freely modify and redistribute its code. First released on September 17, 1991, by Linus Torvalds, Linux has since become a cornerstone of modern computing, renowned for its flexibility and robustness.
As part of the project, I delved into the core aspects of Linux that make it a popular choice for ethical hackers and system administrators alike. Its flexible architecture, command-line interface (CLI), and compatibility with leading security tools such as Metasploit, Nmap, and Wireshark allow professionals to tailor Linux to their specific needs. The platform's open-source codebase and a highly active global development community ensure that vulnerabilities can be identified and patched swiftly, enhancing overall security.
I also demonstrated practical applications by:
-
Customizing Linux distributions to optimize performance for specific use cases, such as penetration testing or server management.
-
Utilizing Bash scripting to automate repetitive tasks and improve system efficiency.
-
Configuring security features like firewalls, intrusion detection systems, and access control mechanisms.
This project showcases my understanding of operating system fundamentals, open-source principles, and practical skills in Linux environments, highlighting my ability to leverage its potential for cybersecurity and server management.
SOHO Router Configurations, Subnetting, Connectivity Testing, Network Documentation, and SOHO Wireless Network Security
Beginning with the crucial role of SOHO networks in our interconnected world, we dive into router configurations for seamless connectivity. We address subnetting for optimal address space utilization, proactive strategies for connectivity testing, and the importance of comprehensive network documentation. This project concludes with a focus on wireless security protocols.
This project has equipped us with a skill set crucial in todays world of network administration. This project demanded technical prowess, adaptability, and effective communication, which are key in today’s tech landscape. In conclusion this project has taught us SOHO router configuration, subnetting, connectivity testing and wireless security. All in all, this has better prepared us in shaping the networks of the future.
The Future is in the Clouds:
A Deep Dive into Cloud Computing
Welcome to the threshold of technological metamorphosis, where we delve into the expansive universe of cloud computing, a convergence of innovation and infrastructure with limitless potential. Our spotlight is on Microsoft Azure, a powerhouse within the realm of cloud solutions. More than just a platform, Azure serves as a catalyst for change, providing scalability, an extensive services portfolio, and a global presence that propels businesses to unprecedented heights. In conclusion, from mastering cloud architecture to delving into automation, security, and data management, my toolkit is now enriched with sought-after capabilities. The cloud journey is continuous, and staying curious and engaged with this evolving digital landscape is key. Whether aspiring to be a cloud architect, a DevOps enthusiast, or a data specialist, the cloud offers boundless opportunities. I am now empowered with a diverse and empowering skill set in the digital landscape of cloud computing.
Python Stock Tracking Program
This project involved creating a comprehensive stock tracking application using Python. Through hands-on experience, I developed expertise in Python programming and embraced object-oriented principles to design an efficient and modular system. The project showcased my ability to handle financial data by integrating functionalities such as importing data from Yahoo! Finance, reading from CSV files, and visualizing stock charts using the Matplotlib library.
One notable aspect of this project was the implementation of a user-friendly graphical user interface (GUI) using Tkinter. This demonstrated my proficiency in designing intuitive interfaces, fostering user engagement. Additionally, the project emphasized my commitment to software quality through unit testing and debugging practices.
Java Landscape Management System
This project involved designing and developing a comprehensive Java-based application for managing landscaping orders. The application features an intuitive graphical user interface built with Java Swing, allowing users to input customer information, select yard types, and calculate costs dynamically. A key aspect of the project was implementing object-oriented programming principles, ensuring a modular and scalable system design.
To provide persistent data storage, the application integrates both file I/O and database functionality using MySQL. Customer data is stored securely in a relational database, with parameterized queries used to prevent SQL injection. Additionally, the application incorporates input validation and error handling to enhance reliability and user experience.
The system was designed using UML diagrams and developed with a three-tier architecture, separating the presentation layer, business logic, and database operations. This approach ensured maintainability and clarity throughout the development process. Dynamic event handling was implemented to manage user interactions such as radio button selections and form submissions.
Through this project, I strengthened my skills in Java programming, database integration, and debugging, while demonstrating my ability to build professional, scalable software solutions.
Mobile Security Analysis Project
This project represents the culmination of NETW411: Information Security and Mobile Devices, where I applied hands-on techniques to explore mobile security concepts through real-world scenarios. Delivered as a PowerPoint presentation, the project compiles multiple lab assignments focused on mobile threats, app behavior, and wireless network security.
The work began with configuring an Android emulator within Oracle VM VirtualBox. One of the key challenges was modifying the network settings to successfully route emulator traffic through a proxy. Once set up, I used tools like Burp Suite and Wireshark to capture and analyze network traffic from mobile applications, allowing for inspection of app behavior and identification of potential security flaws.
I also explored APK file structures and performed basic reverse engineering using tools like APKTool, focusing on examining app contents such as permissions and manifest configurations. Labs included identifying vulnerabilities in mobile traffic, detecting plaintext transmissions, and understanding how apps interact with networks under insecure conditions.
Each stage of the project is supported by annotated screenshots and outputs that illustrate both successful configurations and obstacles overcome. This project strengthened my skills in Android emulation, proxy configuration, traffic analysis, APK inspection, and identifying common mobile security issues—skills that are directly relevant to entry-level roles in cybersecurity and mobile device protection.