Skip to content

Two-week Agile simulation conducting offensive and defensive cybersecurity scenarios.

Notifications You must be signed in to change notification settings

belldre/Live-Project-Cybersecurity

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

8 Commits
ย 
ย 
ย 
ย 

Repository files navigation

Cybersecurity Live Project: Agile Offensive & Defensive Simulation

๐Ÿ“Œ Project Overview

During this intensive live project with The Tech Academy, I participated in a two-week Agile-based cybersecurity simulation. The project involved executing a series of "Sprint Stories" that alternated between offensive and defensive operations.


๐Ÿ› ๏ธ Tech Stack & Tools

Category Tools Utilized
OS / Environment Kali Linux, VirtualBox, VMware
Traffic Analysis Wireshark, PCAP Forensics
Offensive Security Burp Suite, Chromium Proxy
Threat Intelligence VirusTotal, Exploit-DB, Rapid7 (CVE)
Malware Analysis ANY.RUN (Interactive Sandbox)

๐Ÿ›ก๏ธ Key Scenarios & Implementation

1. Network Forensics & Defensive Operations

  • Packet Analysis: Used Wireshark to conduct deep-packet inspection of PCAP files to identify network breaches and potential data exfiltration.
  • Threat Identification: Leveraged VirusTotal and ANY.RUN to perform hash lookups and dynamic analysis of suspicious files.

2. Ethical Hacking & Offensive Operations

  • Web Penetration Testing: Employed Burp Suite to intercept and analyze HTTP/S traffic, identifying vulnerabilities within web applications.
  • Exploit Research: Utilized Exploit-DB and GTFOBins to research privilege escalation paths.

๐Ÿ“ˆ Key Takeaways

  • Developed a deep understanding of the Cyber Attack Lifecycle.
  • Gained hands-on experience in Incident Response and Threat Hunting.

3. ๐Ÿ›ก๏ธ Deep Dive: Null Byte Injection & Filter Bypass

Vulnerability Type: Improper Input Validation / Local File Inclusion (LFI)
Target: OWASP Juice Shop (Restricted /ftp/ Directory)

Executive Summary

Identified a critical security flaw allowing unauthorized access to restricted server configuration files. By utilizing Double Encoding and Null Byte Injection, I successfully bypassed server-side file extension filters to exfiltrate sensitive metadata.

Technical Implementation

  • The Restriction: The application employs a whitelist filter that only permits downloads for "safe" extensions like .md or .pdf.
  • The Exploit: By appending a double-encoded null byte (%2500) followed by a valid extension, I deceived the validation logic.
  • The Payload: http://localhost:3000/ftp/package.json.bak%2500.md
  • The Result: The web filter validated the .md suffix as safe, but the backend server terminated the string at the Null Byte, serving the restricted package.json.bak file instead.

Proof of Concept

Null Byte Injection Screenshot
Figure 1: Screenshot demonstrates the successful download of package.json.bak by poisoning the URL string to bypass the server's file-type validation logic.

Business Impact

The exposure of package.json.bak reveals internal application architecture, dependencies, and configuration. This metadata provides an attacker with a roadmap for further targeted attacks, significantly increasing the risk of a full system compromise.

About

Two-week Agile simulation conducting offensive and defensive cybersecurity scenarios.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published