Projects
SIEM on Azure: Monitoring, Alerts, and Threat Intelligence
Description:
Implemented a Security Information and Event Management (SIEM) system on Microsoft Azure, leveraging Microsoft Sentinel and Log Analytics for comprehensive monitoring and alerting.
Key Achievements:
-Set up a virtual machine and resource group to host the SIEM solution.
-Configured Microsoft Sentinel to integrate with Log Analytics, enabling real-time security monitoring.
-Developed and deployed a custom Sentinel rule to detect unauthorized RDP sign-ins, leading to the logging of over 10,000 security events within the first hour of operation.
-Gained hands-on experience with SIEM tools, threat intelligence, and data collection, enhancing incident detection and response capabilities.
Skills Demonstrated:
-SIEM deployment and configuration
-Threat detection and incident response
-Log analysis and monitoring
Cloud Security with AWS IAM
Description: Configured AWS Identity and Access Management (IAM) to secure cloud infrastructure for NextWork, focusing
on permission management and resource organization.
Key Achievements:
-Set up and managed EC2 instances for production and development environments using environment tags. Created a custom IAM policy to control access to EC2 instances, ensuring secure collaboration while restricting critical actions.
-Implemented a user-friendly AWS Account Alias for streamlined onboarding and access management.
-Tested access controls by simulating user actions, successfully enforcing permissions and security policies.
Skills Demonstrated:
-Cloud security and IAM configuration
-Access control management
-EC2 instance setup and tagging
Home Server Project
Description:
Built and configured a home server running Linux, focusing on implementing robust security measures and optimizing server performance.
Key Achievements:
-Established a secure Linux-based home server environment with firewall rules and non-root user accounts to enhance security.
-Documented the entire setup process, including troubleshooting challenges related to SSH access, IP configuration, and
-Docker container management.
-Applied practical knowledge in network management, server hardening, and cybersecurity best practices, refining skills through hands-on experience.
Skills Demonstrated:
-Linux server setup and configuration
-Network security and firewall management
-Docker containerization and server hardening
Cybersecurity Blog
Description:
Maintained a personal blog, “Phuntsok’s Net,” dedicated to documenting and sharing insights into cybersecurity concepts and practices.
Key Achievements:
-Published articles on various topics, including Capture the Flag (CTF) exercises, home server setup, Linux installation, and cybersecurity events.
-Analyzed and explained recent cybersecurity threats and vulnerabilities, such as the IPv6 bug (CVE-2024-38063), to educate readers on potential risks and mitigation strategies.
-Developed practical skills in Linux, server configuration, and coding projects like a random password generator and an encrypted password manager.
Skills Demonstrated:
-Technical writing and content creation
-Vulnerability analysis and threat research
-Practical coding and security tool development
Coding Projects
Random Password Generator with GUI
Summary:
This tool simplifies password generation with a GUI, making it accessible to users of all levels and adaptable for various security needs.
Features:
-Password Generation: Creates random passwords with letters, numbers, and symbols.
-GUI Interface: Allows users to specify password length and character sets via a user-friendly window.
How It Works Setup:
Utilizes random for generating characters and tkinter for the GUI. Functionality: Users enter the desired password length and choose character options. The generated password is displayed directly in the GUI.
Encrypted Password Manager in Python
Summary:
This project is a secure password manager that uses cryptography to encrypt and store user passwords, ensuring data protection from unauthorized access.
Features:
-Password Encryption: Encrypts passwords using the Fernet symmetric encryption method.
-Key-Based Access: Users generate and load encryption keys to access stored passwords.
-Password Management: Allows users to create, store, and retrieve passwords from encrypted files.
-User-Friendly Menu: Offers intuitive options to create new keys, load existing keys, add new passwords, and retrieve passwords.
How It Works:
-Setup: Developed in Python using the cryptography library for encryption and decryption functions.
-Functionality: The program encrypts passwords and stores them in files. A generated key allows secure access to these passwords, which are stored in a password dictionary. A menu-based system enables password management tasks such as file creation and password retrieval.
Keylogger in Python
Summary:
This project demonstrates the creation of a keylogger in Python that captures and logs keystrokes into a text file, with additional functionality to convert the script into an executable for deployment.
Features:
-Keystroke Logging: Captures and logs every keystroke into a text file.
-File Management: Automatically creates a log file if one does not exist and writes all captured keystrokes to it.
-Error Handling: Ensures the program continues running by logging errors when certain characters can’t be captured.
-Executable