There aren't any blog posts in this category, yet.
Used the Metasploit framework to probe and exploit shell execution in a test PHP web application. My first successful “hack”!
Implemented a click-jacking exploit of a test GT website, and implemented frame-busting safeguards in a Chrome extension to stop the exploit.
Conducted forensic identification, decompilation, and analysis of two malware packages deployed in Windows and Android environments.
Configured snort to detect, isolate, and stop a botnet infection.
Used zmap to conduct a HTTP port scan of the entire ipv4 space.
Implemented a polymorphic blend attack exploit to defeat a payload-based intrusion detection system (PAYL).
Used mininet, a software-defined networking (SDN) tool, to create and simulate dynamic network topologies.
Implemented a Spanning Tree Protocol in mininet to create a loop-free forwarding network.
Implemented a DV protocol in multiple, complex, and virtualized packet-switched networks.
Reproduced and analyzed TCP Fast Open (TFO) on production web servers, including Hacker News, Reddit, and gnu.org.
Reproduced and analyzed Multipath TCP (MPTCP) and experimental results from How Hard Can it Be? Designing and Implementing a Deployable Multipath TCP (Raicu 2012) on a virtualized network.
Conducted a comparative analysis on TCP CUBIC and TCP Reno for congestion control and buffer bloat in virtualized networks.
Used pyretic to configure a firewall SDN.
Configured a virtualized Border Gateway Protocol (BGP) topology, conducted a prefix hijack, and created security protocols to detect and prevent them.