The Web Application Vulnerability Scanner is a Python-based security tool designed to detect and analyze vulnerabilities in web applications. It automates the identification of SQL Injection, XSS, CSRF, and open ports using tools like OWASP ZAP, Nmap, and Wapiti. The scanner features a command-line interface (CLI), automated scan scheduling with APScheduler, and detailed PDF reporting via ReportLab, ensuring continuous security assessment. It was tested on various web applications, successfully identifying critical vulnerabilities and generating structured reports. Future improvements include GUI development, enhanced detection capabilities, and real-time monitoring to strengthen web security further.
I conducted research on WannaCry Ransomware, analyzing its infection mechanism, encryption techniques, and propagation strategy. My study focused on how WannaCry exploited the EternalBlue vulnerability (SMBv1 exploit) to spread across networks, encrypting files and demanding Bitcoin ransom. I also examined mitigation strategies, security patches, and preventive measures to defend against similar ransomware attacks.
Characteristics of WannaCry Ransomware:
Propagation Method: Spreads using the EternalBlue exploit in unpatched Windows systems.
File Encryption: Encrypts files with a .WNCRY extension using AES and RSA encryption.
Ransom Demand: Displays a ransom note demanding Bitcoin payment for decryption.
Kill Switch Domain: Initially contained a hardcoded kill switch that slowed its spread.
Targeted Systems: Primarily affected Windows systems lacking security updates.
I collaborated with a team of three on a research project analyzing the Tor (The Onion Router) network, focusing on its privacy, security, and future prospects. My role involved conducting an extensive study of the Tor network’s architecture, encryption mechanisms, and anonymity features. I explored how Tor enables anonymous communication, protects user identity, and ensures secure browsing through multi-layered encryption and relay nodes. Additionally, I analyzed security challenges, potential vulnerabilities, and real-world applications of Tor, including its use in journalism, activism, and cybersecurity. The research also examined future developments in Tor technology, addressing improvements in performance, resistance to censorship, and emerging privacy-enhancing techniques.