WANNACRY ANALYSIS
Static and dynamic analysis of WannaCry ransomware in a sandboxed lab. Documented the EternalBlue propagation chain, SMBv1 exploitation, AES-RSA encryption routine, and C2 communication patterns.
Real-world security research, lab projects, and CTF writeups. Each case study documents the methodology, tools used, findings, and outcomes.
Static and dynamic analysis of WannaCry ransomware in a sandboxed lab. Documented the EternalBlue propagation chain, SMBv1 exploitation, AES-RSA encryption routine, and C2 communication patterns.
Home lab environment with live packet capture. Built custom Snort IDS rules to detect port scans, brute-force, and anomalous payloads with full alert correlation and Wireshark analysis.
CIS-benchmark-aligned security audit of a Linux server using Lynis. Identified and remediated SSH misconfigs, kernel parameters, and unnecessary service exposure with before/after scoring.