{"id":441,"date":"2025-08-06T03:57:56","date_gmt":"2025-08-06T03:57:56","guid":{"rendered":"https:\/\/student.wp.odu.edu\/zabeb001\/?page_id=441"},"modified":"2025-08-10T06:27:01","modified_gmt":"2025-08-10T06:27:01","slug":"ethical-hacking","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/zabeb001\/ethical-hacking\/","title":{"rendered":"Ethical Hacking"},"content":{"rendered":"\n<p>This page highlights three core ethical hacking skills I practiced in a safe, scoped lab: SQL injection, steganography with Steghide, and malware analysis. My goal is to show clear impact, document evidence, and provide practical fixes that teams can use.<\/p>\n\n\n\n<p><strong>Artifacts<\/strong><\/p>\n\n\n\n<p><strong>SQL Injection<\/strong><br>I found injectable inputs, used them to bypass a login and read data, and recorded each step with screenshots. I explain the risks in plain terms and then show fixes like parameterized queries, stricter input checks, least\u2011privileged database roles, and, where appropriate, WAF rules. The result is a simple path from finding to remediation.<\/p>\n\n\n\n<ul>\n<li><strong><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/08\/CYSE_450_Lab_5_SQL_Injection_Attack.pdf\" data-type=\"link\" data-id=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/08\/CYSE_450_Lab_5_SQL_Injection_Attack.pdf\">S<\/a><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/08\/CYSE_450_Lab_5_SQL_Injection_Attack.pdf\" data-type=\"link\" data-id=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/08\/CYSE_450_Lab_5_SQL_Injection_Attack.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">QL Injection<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Steganography with Steghide<\/strong><br>I hid a small text file inside an image, verified the change with hashes, and extracted it using a passphrase. I also reviewed metadata with exiftool and noted signs that can suggest hidden content. This builds comfort with both creating and detecting basic steganography.<\/p>\n\n\n\n<ul>\n<li><strong><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/08\/CYSE_450_Lab_4_StegHide.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Steghide<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Malware Analysis<\/strong><br>I ran samples in a sandbox and watched their process, file, and network activity. I pulled indicators of compromise, compared families like Mirai and a keylogger, and mapped behaviors to MITRE ATT&amp;CK. I then wrote simple detection ideas and containment steps that a team can apply quickly. <\/p>\n\n\n\n<ul>\n<li><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/08\/CYSE_450_Lab_3_Malware_Analysis.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Malware Analysis<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This page highlights three core ethical hacking skills I practiced in a safe, scoped lab: SQL injection, steganography with Steghide, and malware analysis. My goal is to show clear impact, document evidence, and provide practical fixes that teams can use. Artifacts SQL InjectionI found injectable inputs, used them to bypass a login and read data,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/student.wp.odu.edu\/zabeb001\/ethical-hacking\/\">Read More<\/a><\/div>\n","protected":false},"author":28351,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/441"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/users\/28351"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/comments?post=441"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/441\/revisions"}],"predecessor-version":[{"id":506,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/441\/revisions\/506"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/media?parent=441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}