Skip to content

AlCodes808/Networking-And-Cybersecurity

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 

Repository files navigation

Networking-And-Cybersecurity

Hands-on networking and security lab documentation showcasing practical skills in network administration, security hardening, and penetration testing.

🎯 Penetration Testing

  • Exploited SSRF vulnerability to abuse AWS IMDSv1 and exfiltrate IAM credentials from EC2 metadata service
  • Performed multi-hop SSH pivoting across segmented VPC subnets (public β†’ private β†’ restricted) to compromise isolated instances
  • Leveraged overprivileged IAM roles and security group misconfigurations to enumerate EC2 infrastructure and exfiltrate sensitive data from S3
  • Captured 3 flags demonstrating full attack chain: initial access, lateral movement, and crown jewels exfiltration

πŸ›‘οΈ Defense & Hardening

Coming soon - AWS security hardening and defensive configurations

πŸ”§ Tools Development

  • Developed automated port scanning utilities in Bash using Netcat for TCP enumeration and attack surface discovery
  • Built multi-port scanner with external configuration, result logging, and filtering capabilities for scalable network reconnaissance
  • Identified open SSH, HTTP, and HTTPS services on target systems with automated grep filtering and persistent result storage
  • Demonstrated practical scripting for security assessments with file I/O redirection and dynamic user input handling

πŸ§ͺ Labs

Coming soon

πŸ“š OSCP Study

  • Exploited file upload vulnerability in Zerion Mini Shell to achieve remote code execution and establish reverse shell as www-data
  • Discovered exposed password hash in /etc/passwd, cracked with John the Ripper, and performed lateral movement through multiple user accounts
  • Enumerated PHPMyAdmin config files to extract reused database credentials, escalating from oracle β†’ karla β†’ root via sudo permissions
  • Completed box in ~2 hours with full root access, demonstrating enumeration, lateral movement, and privilege escalation techniques

About

Hands-on networking and security lab documentation showcasing practical skills in network administration, security hardening, and penetration testing.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors