Posts

Malware Traffic Analysis with Wireshark - Detecting Dridex C2 Traffic

Image
  In this project, I analysed a PCAP capture of a compromised Windows machine to uncover signs of a Dridex  banking Trojan infection. Using Wireshark   I identified encrypted TLS sessions, extracted suspicious Server Name Indication (SNI) domains , followed malicious TCP streams, and confirmed active C2 beaconing. This post shows step-by-step how I discovered the infection along with key Indicators of Compromise ( IOCs ) so you can replicate the same process in your own malware traffic analysis lab . Lab Topology & Overview Host OS for analysis: Ubuntu . Packet analysis tool: Wireshark Enviromental Setup & Pcap download Before opening the PCAP file , I ensured my virtual machine was isolated from the Interne t so that any embedded malware activity could NOT communicate externally. I changed my VMware network adapter to LAN Segment (Away From Internet) : What this guarantees No accidental malware execution No C2 communication leaving the VM Safe packet analysi...

Practical IDS Lab (SNORT)

Image
  Detecting Network Intrusions with Snort in My Home Lab In this project, I built a practical Intrusion Detection System (IDS) lab using Snort , an open-source Network Intrusion Detection System widely used by security analysts . The lab environment included an Ubuntu VM running Snort, a Kali Linux VM acting as the attacker machine, and a Metasploitable 2 VM as the intentionally vulnerable target. The goal of this project was to simulate basic attacks such as ICMP pings and Nmap SYN scans , detect them using custom Snort rules , and document the alerts for portfolio demonstration. Lab Topology & Overview The virtual lab was set up on an isolated internal/host-only network to ensure all testing remained safely contained. The environment consisted of: • Ubuntu (Snort IDS) — Used to install and run Snort, monitor traffic, and store alert logs. • Kali Linux — Used as the attacker machine to generate pings, port scans, and reconnaissance traffic. • Metasploitable 2 — S...

Building My Personal Cybersecurity HomeLab

Image
  Introduction In the fast-paced world of cybersecurity , having a safe and controlled environment for testing tools and techniques is essential. For my first project, I built a fully functional cybersecurity HomeLab using VMware Workstation Pro 17 . This HomeLab allowed me to simulate real-world scenarios, practice both red and blue team skills , and prepare for future professional work without risking my main system or any live network. Objectives - Create an isolated virtual network for cybersecurity testing. - Install multiple virtual machines (VMs) to simulate different systems and environments. - Configure networking to allow both internet access and private lab communications. - Lay the foundation for advanced cybersecurity projects such as IDS/IPS deployment , malware analysis , and threat detection. Tools and Resources I used a range of tools and virtual machines to build my HomeLab. This variety ensured I could replicate real-world cybersecurity environmen...

My Cybersecurity Journey: From Getting Hacked to Hacking Back

Image
Everyone starts somewhere and for me, it all began with a really bad website. I was 14 when I built my first web page. It was broken, messy, and full of mistakes but it was mine. And that was enough. Something clicked. I kept building. My second site wasn’t great either, but it was better. Then came the third a simple login page and a working web app. That one made me proud. I felt like I was actually creating something. Then... I stopped. Back then, programming didn’t seem like a future. It felt like a phase fun, but uncertain. So I drifted away. But deep down, that itch to build, break, and understand how things worked never really left. Eventually, I came back. This time, it was different. I dove into full-stack development front-end was familiar, but I embraced the backend too, learning Python, Django, and the logic that makes web apps tick. I was building better, smarter systems. But I didn’t know my biggest turning point was still ahead. The Turning Point Everything shifted...