Pinned Repositories
Buffer-Overflow-
Exploiting buffer overflow vulnerability and finding methods to mitigate it
Computer-Forensics-
In this project, two dd image files are carved and analyzed using Autopsy
Deffie-Hellman-Key-Exchange
Python project for Deffie-Hellman Key Exchange and it includes a video presentation
Finding-Collisions-
This project is about finding collisions in the output of a hashing algorithm
Malware-Detection
Analyzing malware files such as njRAT and creating YARA rules to detect malware files
Memory-Forencsics-
In this project, we use the tool Volatility available in CAINE to analyze a memory dump captured from a machine infected by the zeus botnet
Password-Cracking-
This is a presentation about cracking hashed passwords via HashCat. The password hashes were extracted from the /etc/shadow password file of a Linux computer
Public-key-cryptography
GPG (https://gnupg.org) is a public key cryptographic tool that can be used to encrypt, decrypt, sign, and verify files and emails. In this presentation, the concept of public key cryptography is explored.
SQL-injection-
Performing SQL injection attacks and using prepared statements to mitigate the vulnerability
Suricata-IPS-IDS
Scanning via nmap and performing a RCE (Remote Code Execution) attack on the SMB port using Metasploit. Using netstat to detect the attack. Using Wireshark to analyze the malicious payload. Deploying and configuring Suricata (IDS/IPS) to alert when the attack happens again
karansj4's Repositories
karansj4/Buffer-Overflow-
Exploiting buffer overflow vulnerability and finding methods to mitigate it
karansj4/Computer-Forensics-
In this project, two dd image files are carved and analyzed using Autopsy
karansj4/Deffie-Hellman-Key-Exchange
Python project for Deffie-Hellman Key Exchange and it includes a video presentation
karansj4/Finding-Collisions-
This project is about finding collisions in the output of a hashing algorithm
karansj4/Malware-Detection
Analyzing malware files such as njRAT and creating YARA rules to detect malware files
karansj4/Memory-Forencsics-
In this project, we use the tool Volatility available in CAINE to analyze a memory dump captured from a machine infected by the zeus botnet
karansj4/Password-Cracking-
This is a presentation about cracking hashed passwords via HashCat. The password hashes were extracted from the /etc/shadow password file of a Linux computer
karansj4/Public-key-cryptography
GPG (https://gnupg.org) is a public key cryptographic tool that can be used to encrypt, decrypt, sign, and verify files and emails. In this presentation, the concept of public key cryptography is explored.
karansj4/SQL-injection-
Performing SQL injection attacks and using prepared statements to mitigate the vulnerability
karansj4/Suricata-IPS-IDS
Scanning via nmap and performing a RCE (Remote Code Execution) attack on the SMB port using Metasploit. Using netstat to detect the attack. Using Wireshark to analyze the malicious payload. Deploying and configuring Suricata (IDS/IPS) to alert when the attack happens again
karansj4/TCP-IP-exploit
Performing TCP/IP exploits such as SYN Flooding, TCP RST attack on SSH and TLS connections, session hijacking, and revershell attacks
karansj4/Wireshark-http-vs-https-traffic
In this project, Wireshark is used to analyze IP packets. The difference between a website that uses TLS (https) is compared to a website that does not use TLS (http). It is overserved that the TCP traffic over http is totally unencrypted and exists in plain text - including passwords. In contrast, https traffic is encrypted.