- Cloud Resume Challenge
The only way to confidently find threats in cloud infrastructure is to understand the assets they aim to exploit! The CRC requires its challengers to grasp, develop, and secure multiple cloud services. One of the best takeaways from this project was a greater understanding of how Identity works in AWS - outside of just IAM. I decided to take an extensible, realistic, and applicable approach to managing identity by configuring AWS Organizations, AWS SSO, and secure AWS CLI access.
- Autoaudit - A Lightweight Bash Program to Detect Log Tampering and Identity Attacks
Early in my cybersecurity career, I identified Linux systems as a personal shortcoming. Determined to do better, I studied for and passed the Linux+ certification, also developing a new appreciation for the OS. As part of my ongoing exploration, I built a lightweight Bash tool that will detect log tampering and authentication attacks in the often-overlooked utmp, btmp, and wtmp logs. You can view the script and try it out for yourself at my Github and read this Medium write-up!
- Native Bash Implementation of DBSCAN
I saw a lot of value in having a lightweight, extensible implentation of Density Based Spatial Clustering with Applications of Noise (DBSCAN) written in Bash (shell)... so I wrote it out. This project helped develop my understanding of machine learning and Bash - and as far as I'm aware - there's no other Bash DBSCAN program out there. It can be found on my Github.