Cybersecurity | Ethical Hacking | IT Infrastructure
This project investigates the effectiveness of various password protection mechanisms in mitigating brute-force attacks through a series of controlled experiments in a secure lab environment. The attacks were executed from a Kali Linux machine against login pages hosted on a dedicated web server. The evaluated security measures included no protection, session-based restrictions, database-level protections, and IP-based blocking. Additionally, the security of hashed passwords was tested using Hashcat.
The results showed that unprotected login pages were highly vulnerable, allowing tools like Hydra to test thousands of passwords in a short time. While session-based and IP-based restrictions slowed the attacks, attackers could bypass these measures using new sessions or IP hopping. Database-level restrictions proved to be the most effective, preventing all brute-force attempts but introducing potential accessibility issues, as legitimate users could be locked out after repeated failed login attempts.
This study highlights the importance of combining strong passwords with robust security mechanisms such as database-level protections, multi-factor authentication (MFA), and CAPTCHA to enhance security without compromising user accessibility. The findings also connect to the CIA triad (Confidentiality, Integrity, and Availability), emphasizing how weak security measures can expose organizations to severe operational and reputational risks. From a financial sustainability perspective, companies failing to implement adequate security measures risk significant economic losses due to compromised accounts, brand damage, and business disruptions.
Download Full Report (docx)This project focuses on enhancing anomaly detection through an optimized machine learning pipeline. The core approach involves using Principal Component Analysis (PCA) for dimensionality reduction and a Support Vector Machine (SVM) classifier with an RBF kernel to identify anomalies in the data. Initially, the dataset undergoes rigorous data cleaning, where missing values in the target "ANOMALY" column are removed, and irrelevant columns are excluded. The remaining numerical features are standardized to ensure that the PCA and SVM models perform effectively.
To tackle the challenge of class imbalance, the project implements SMOTE (Synthetic Minority Over-sampling Technique), which synthetically generates additional samples for the underrepresented class, thereby improving the model’s ability to correctly identify anomalies. The original SVM model achieved an overall accuracy of 88.1%, with particularly high performance for the anomaly class. However, the model showed some difficulty correctly classifying normal data points.
To further improve the detection performance, various enhancements were explored. Adjusting SMOTE parameters—specifically increasing the number of neighbors—and increasing the number of PCA components from three to five significantly boosted the model's accuracy and F1-scores. Additionally, alternative algorithms such as Random Forest and XGBoost were evaluated. The Random Forest model, in particular, demonstrated outstanding performance, achieving 100% accuracy in our tests.
Overall, this project demonstrates the effectiveness of combining advanced data preprocessing, dimensionality reduction, and robust classification techniques to build a highly accurate anomaly detection system. The improvements highlighted in this work are particularly relevant for applications in cybersecurity, system monitoring, and any field where the accurate detection of anomalies is critical.
Download Full Report (docx)This project implements a secure system that combines RSA encryption with steganography to protect sensitive information. The system encrypts files using RSA by breaking them into smaller chunks, ensuring that the file's content remains confidential through the use of a public key. To further enhance security, the private RSA key needed for decryption is concealed within an image using the Least Significant Bit (LSB) steganographic method. This dual-layer approach not only secures the file content but also hides the decryption key, making unauthorized access significantly more challenging.
Additionally, the project includes clear, step-by-step instructions for installing the necessary modules, running the Python script, extracting the hidden key from the image, and finally decrypting the file. This practical solution is designed to safeguard data in both personal and professional settings, ensuring secure digital communication and storage.
Download Full Report & instructions(zip)This project involves designing and implementing a comprehensive network solution for a company with operations across two sites. As a group, we developed an integrated network architecture using Packet Tracer and later demonstrated the solution on physical equipment, including rack servers. Our project covers a wide range of network design and configuration tasks that reflect real-world enterprise networking challenges.
Overall, this project demonstrates our ability to integrate theoretical knowledge with practical skills in designing, configuring, and managing complex network environments. The hands-on experience with both simulation and physical hardware highlights our preparedness to tackle real-world networking challenges.
Download Full Report (PDF)Assessing the security vulnerabilities of IoT devices through penetration testing.
Download Full Report (PDF)