You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This repository contains the full portfolio for the Ethical Hacking Individual Assignment 2, demonstrating practical and analytical skills across several cybersecurity domains. It documents forensics, threat hunting, penetration testing, vulnerability assessment, and exploitation walkthroughs in a professional and evidence-backed manner.
Intended use: Educational / academic submission only. All testing was performed in isolated lab environments or on authorised vulnerable machines.
Student Details
Name
Student ID
University
Kalaichelvan Thieveshkar
CB013248
Staffordshire University
🛡️ Part A: Design, Analysis, Forensics & Scripting
1. Multi-Factor Authentication (MFA) Implementation for SSH
Hardening an Ubuntu SSH server with Google Authenticator-based MFA and security best practices.
Component
Description & Key Action
Commands / Tools Used
Initial Setup
Configured an Ubuntu SSH server and a client machine.
sudo apt install openssh-server
Penetration Test
Brute-forced weak password using Kali Linux.
ifconfig, netdiscover, nmap -sV, Hydra
SSH Hardening
Changed default SSH port, set strong password, limited MaxAuthTries.
A portfolio demonstrating advanced blue and red team skills, including: SSH MFA implementation, Volatility-based memory forensics to detect code injection, Splunk threat hunting (BOTS v3), Wireshark C2 analysis, and kernel exploitation walkthroughs (LinPEAS, VulnHub).