Security projects

phishing, credentials, data-6573326.jpg

Phishing Email Awareness

I go through 2 different categories on how to spot phishing attacks. Covered topics:

  • Common mistakes and baits
  •  Used of personal email in professional settings
  • Root domains
  • Reply to field
  • Signed by field

Nmap and WireShark

Using both Nmap and Wireshark to find vulnerability on a environment with active directory domain controller, windows machines, and Linux vms.