Welcome to my repository containing documentation for various cybersecurity class projects completed as part of my learning journey. This repository hosts PDF files summarizing projects executed within controlled Cisco virtual environments.
The documents included here detail practical exercises and projects completed for cybersecurity training purposes. Each project was conducted within legal and ethical bounds, ensuring compliance with applicable laws and regulations.
Important: These materials are for educational purposes only. No unlawful activities were conducted during the execution of these projects.
Description:
This project focused on conducting a lab exercise on SQL Injection (SQLi) attacks, specifically emphasizing password bypass attacks. SQL Injection involves manipulating a web application's input fields to execute unauthorized SQL commands.
Tools Used:
Findings:
Description:
This project delved into social engineering and remote shell exploitation, focusing on embedding a remote shell malware into a program and executing it via social engineering tactics.
Tools Used:
Findings:
Feel free to browse through the documentation to gain insights into these cybersecurity projects. If you have any questions or feedback, please don't hesitate to reach out.
While these projects were conducted in a controlled environment for educational purposes, ensure that you adhere to all legal and ethical guidelines when conducting cybersecurity activities.