Cybersecurity / IT
Network Vulnerability and Anomaly Analysis
Conducted a network security assessment using Nmap and Wireshark to identify vulnerabilities and anomalies in a simulated environment. Gained hands-on experience analyzing outdated services, insecure protocols, and suspicious traffic patterns with real-world mitigation strategies.
Broken Access Control Exploitation Lab (OWASP Juice Shop)
Identified and exploited Broken Access Control vulnerabilities using OWASP Juice Shop, simulating IDOR and privilege escalation through role tampering and insecure client-side controls. Utilized tools like Burp Suite, Postman, and Chrome DevTools to intercept, modify, and analyze HTTP requests for unauthorized access.
5. Acronym and Standard Drills
Network+ is acronym-heavy. Drill these daily:
-
Common Ports and Protocols: HTTP (80), HTTPS (443), DNS (53), DHCP (67/68), SMTP (25), FTP (20/21)
-
Networking Standards: 802.11 (Wi-Fi), 802.3 (Ethernet), CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
-
Security Concepts: CVE (Common Vulnerabilities and Exposures), IDS (Intrusion Detection System), IPS (Intrusion Prevention System)
PROJECTS
SecWithAhsan@gmail.com