Umair's Portfolio

Cybersecurity Enthusiast | Transitioning from Software Engineering | SOC | Cloud Security | CEH Certified

WPA2 Cracking and MAC Address Spoofing

This project involved testing wireless network security by setting up a WPA2-secured test network and attempting to crack the encryption using Kali Linux and Reaver.
In a second phase, Bypass the MAC filtration by spoofing MAC with registered MAC address.

IOT

The proposed system named as Voice Controlled Electronics is basically a sub-domain of Smart Home also known as home automation.

In-Depth analysis and applications of FTK Imager

This project focuses on the FTK Imager, a widely used forensic imaging tool. The project includes a detailed examination of FTK Imager's features through practical demonstrations and applies this knowledge to solve a forensic case study. The aim is to provide a comprehensive understanding of FTK Imager's capabilities and its application in digital forensics.

RSA algorithm and hash

Understand the RSA algorithm and hash function along with digital signature. Develop an application and encrypt a message, sign it, and then send it over the network and to the receiver, end decrypt the message and verify the integrity with the hash function and verify the user with a digital sign.

Port Security using Cisco Packet Tracer

This project demonstrates how to implement port security on a network switch using Cisco Packet Tracer. It includes configuring MAC address restrictions on switch ports to prevent unauthorized devices from accessing the network, thereby enhancing local network security.

Steganography, Cryptography and
Network Behaviour Analysis

This project explores how steganography can be used to hide data within image files and demonstrates both the embedding and extraction processes. Additionally, it includes an analysis of network behaviour during data transmission, focusing on how TCP handles the transfer of steganographic files. Basic cryptographic techniques were also applied to enhance data confidentiality before hiding

IEEE 802.11 Wireless Framework Analysis

This project involves analysing the IEEE 802.11 protocol using network traffic capture tools. Key wireless management frames such as beacon frames, association requests, and disassociation notifications were examined to understand how wireless devices discover and maintain connections with access points.