Ethical Hacking of Ubuntu VM using Metasploit
Technologies: Metasploit, Ubuntu VM
•
Conducted ethical hacking on a virtual machine to identify weaknesses and simulate attacks
•
Utilized Metasploit to exploit vulnerabilities, successfully demonstrating the necessity of robust security measures
Intrusion Detection System for IoT Devices using Blockchain
Technologies: Blockchain, Smart Contracts, IoT
•
Designed and developed an intrusion detection system that leverages blockchain for enhanced security of IoT devices
•
Implemented smart contracts to automate threat detection, significantly improving data integrity and device reliability
HoneyChain: Blockchain-Based Honeypot Network
Technologies: Blockchain, Smart Contracts, Honeypot, SSH, HTTP
•
Designed and deployed a honeypot-based network to attract and analyze attacker behavior, capturing intrusion attempts on simulated services like SSH and HTTP
•
Integrated blockchain for tamper-proof logging of attack data using smart contracts, ensuring immutable and verifiable forensic records
•
Built a real-time dashboard to visualize attacker IPs, geolocation, and attack patterns, enabling deeper insights into emerging threats