Projects
❌ Tic-Tac-Toe ⭕
Nov 29, 2021
ReactJS
Javascript
BennyChan.dev
Nov 29, 2021
NextJS
CI/CD
Notion
TypeScript
ReactJS
Skill Squatting Attacks on Amazon Alexa
Mar 24, 2021
Cyber Physical System Sec
Amazon
Vulnerabilities
Vulnerability Exploitation in ICS Protocol
Mar 24, 2021
Cyber Physical System Sec
Vulnerabilities
ICS
Reconnaissance and Attack on ICS Networks
Mar 3, 2021
Cyber Physical System Sec
ICS
ModBus
PLC Programming with Ladder Logic
Feb 1, 2021
Cyber Physical System Sec
PLC
Ladder Logic
Design & Simulation of Industrial Control Systems
Jan 19, 2021
Cyber Physical System Sec
Factory IO
ICS
Machine Learning for Security
Nov 3, 2020
Network Security
Machine Learning
Network Monitoring
Oct 15, 2020
Network Security
Monitoring
Wireshark
Snort
Advanced Malware Analysis
Sep 24, 2020
Network Security
Malware
Analysis
Advanced Web Security
Sep 8, 2020
Network Security
Vulnerabilities
Penetration Testing
Aug 24, 2020
Network Security
Shellshock
Metasploit
Relational Database Development
May 27, 2020
Databases
EER
IFD
Star Search - Implementation
Feb 6, 2020
Software Architecture & Design
Implementation
Java
Star Search - Analysis and Design
Jan 13, 2020
Software Architecture & Design
Analysis
UML
White-Box Testing
Oct 26, 2019
Software Development Process
Testing
Java
Category Partition
Oct 26, 2019
Software Development Process
Test Case
Java
Software Design
Sep 19, 2019
Software Development Process
Design
UML
Simple Android App
Sep 7, 2019
Software Development Process
Java
Android
Basic Java Coding and JUnit
Sep 7, 2019
Software Development Process
Java
JUnit
Git Usage
Sep 2, 2019
Software Development Process
Git
Web Security
Writing simple web vulnerabilities using Javascript/HTML
Jul 30, 2019
Information Security
Web
Vulnerabilities
All Things Cryptography
Advance knowledge of cryptography and hashing by working through example exercises and then trying to exploit some vulnerable systems.
Jul 16, 2019
Information Security
RSA
SHA256
Cryptography
Malware Analysis
Get familiar with the types of behaviors that can be displayed by malware and with how to safely analyze these behaviors
Jun 25, 2019
Information Security
Cuckoo
Malware
Analysis
Buffer Overflows
Exploiting Buffer Overflows
Jun 12, 2019
Information Security
C
GDB
BGP Hijacking Attacks
Exploring some of the vulnerabilities of Border Gateway Protocol (BGP).
Apr 21, 2019
Networking
MiniNet
BGP
Hack
SDN Firewall
Use SDN to create a configurable firewall using an OpenFlow enabled switch.
Mar 31, 2019
Networking
Python
TCP
UDP
Firewall
Congestion Control & Buffer Bloat
Study the dynamics of TCP in home networks, specifically congestion control algorithms and buffer occupancy.
Mar 10, 2019
Networking
Congestion Control
MiniNet
TCP Fast Open
Learn about a specific change to TCP that reduces transfer latency.
Mar 3, 2019
TCP
Networking
Python
MiniNet
Distance Vector Routing
Distance Vector routing protocols, one of the two classes of routing protocols. DV
protocols, such as RIP, use a fully distributed algorithm that finds shortest paths by solving the Bellman-Ford equation at each node
Feb 4, 2019
Networking
Python
Distance Vector
Spanning Tree Protocol
Spanning Trees can be used to prevent forwarding loops on a layer 2 network.
Jan 19, 2019
Networking
Spanning Tree
Python
Defining Topologies and Simulating Networks
Representing network topologies in Mininet, and practice how to
simulate basic network commands on these topologies in the Mininet command prompt
Jan 12, 2019
Networking
Simulation
Topologies
MiniNet