This page highlights three core ethical hacking skills I practiced in a safe, scoped lab: SQL injection, steganography with Steghide, and malware analysis. My goal is to show clear impact, document evidence, and provide practical fixes that teams can use.
Artifacts
SQL Injection
I found injectable inputs, used them to bypass a login and read data, and recorded each step with screenshots. I explain the risks in plain terms and then show fixes like parameterized queries, stricter input checks, least‑privileged database roles, and, where appropriate, WAF rules. The result is a simple path from finding to remediation.
Steganography with Steghide
I hid a small text file inside an image, verified the change with hashes, and extracted it using a passphrase. I also reviewed metadata with exiftool and noted signs that can suggest hidden content. This builds comfort with both creating and detecting basic steganography.
Malware Analysis
I ran samples in a sandbox and watched their process, file, and network activity. I pulled indicators of compromise, compared families like Mirai and a keylogger, and mapped behaviors to MITRE ATT&CK. I then wrote simple detection ideas and containment steps that a team can apply quickly.