Skip to content
View bastet27's full-sized avatar

Block or report bastet27

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bastet27/README.md

Hello, I'm bastet27 πŸ–€

Welcome to my GitHub page!

Introduction πŸ–€

I am a Cybersecurity student with an interest in pentesting and Digital Forensics and Incident Response (DFIR). While I am still exploring the different areas of cybersecurity, I am passionate about building a strong foundation of skills and knowledge to discover where my true strengths and interests lie. This page serves as a reflection of my journey and the projects that help me grow in this ever-evolving field.


Objective πŸ–€

The purpose of my GitHub is to track my learning, monitor my progress, and showcase the skills I am developing in the cybersecurity field. Through various projects and challenges, I aim to demonstrate my technical abilities while highlighting areas I am actively working to improve.


🧠 Skills

Skill Description Project
Cryptographic Analysis Solved cipher, hashing, and decryption challenges. WiCyS SANS Security Scholarship
Digital Forensics and Incident Response (DFIR) Analyzed PCAP files, reconstructed events, and recovered critical data during investigations. TryHackMe Advent of Cyber 2024
Exploit Development Leveraged tools like Metasploit for identifying and exploiting vulnerabilities. WiCyS SANS Security Scholarship
HomeLab Network Security Configured Ubuntu Server as a firewall, tested network segmentation, and monitored traffic. HomeLab
Log Analysis Investigated and filtered logs to identify true positives and false positives in SIEM solutions. TryHackMe Advent of Cyber 2024
Pentesting Conducted web exploitation tasks, such as brute-forcing and SQL injection, during CTF challenges. WiCyS SANS Security Scholarship
SIEM Monitoring and Alert Analysis Configured and used Wazuh for log monitoring, alert generation, and analysis. SOC Automation Lab (On Hold)
Vulnerability Scanning Used tools like Nmap and Shodan for scanning, discovery, and assessing open ports and services. WiCyS SANS Security Scholarship

🧰 Tools

Endpoint Network Pentesting SIEM Utilities
Sophos EDR - Monitoring endpoint threats & response Nmap - A network scanning tool used for discovering hosts and services. Burp Suite - A web application security testing platform. Elastic SIEM - A security analytics tool for investigating alerts and differentiating between true and false positives. CyberChef - A versatile data analysis and decoding tool.
PhishThreat - Simulating phishing attacks & security awareness training Shodan - A search engine for finding specific types of internet-connected devices. Metasploit - A penetration testing framework for exploiting vulnerabilities. Wazuh - A SIEM solution for monitoring logs and analyzing alerts.
Wireshark - A packet analyzer used for network troubleshooting and analysis.

πŸ† Certifications

  • Out of 576 applicants, I was accepted into the WiCyS Google Cybersecurity Certificate Self-Led Program. I can begin March 10, 2025.
  • Currently exploring other training and certification options to enhance my skills and validate expertise.

πŸ“Œ Projects

🏠 HomeLab

A dedicated and secured environment to test and learn new cybersecurity concepts, including detection, monitoring, SIEM solutions, and offensive security testing.

  • Key Goals:

    • Build a networked lab with firewalls, SIEM tools, and monitoring solutions.
    • Experiment with vulnerability scanning, pentesting, and log analysis.
    • Use Ubuntu as a firewall and Kali Linux for security testing (Setup Guide).
    • Deploy Wazuh & ELK stack for centralized log analysis.
  • Current Progress:

    • Deployed: Ubuntu Server (acting as a firewall) and multiple VMs.
    • Next Steps: Testing SIEM solutions, refining network segmentation, and automating monitoring tasks.

πŸ₯Ό SOC Automation Lab (On Hold)

This ongoing project simulates a Security Operations Center (SOC) environment for hands-on learning.

  • Progress:
    • Deployed Wazuh on an AWS EC2 instance to monitor logs and analyze alerts.
    • Configured firewall rules and security groups for secure access to the Wazuh dashboard.
    • Future plans include integrating SOAR tools like Shuffle and case management solutions like The Hive to enhance automation and incident response capabilities.

Participating in this annual month-long challenge, which involves solving practical cybersecurity tasks in a holiday-themed narrative.

  • Key Focus Areas: Tasks include malware analysis, reverse engineering, log analysis, web security, and cryptographic challenges.
  • Progress: Successfully completed Days 1 through 23, with detailed write-ups for each challenge to be shared post-event.

Built a Mini MagicMirror to serve as a desktop planner for tracking calendar events, weather updates, and more.

  • Key Features:
    • Uses a Raspberry Pi 3 Model B and a 7" screen for a compact setup.
    • Displays customized modules for:
      • Clock: Includes moon phase settings for sunrise, sunset, moonrise, and moonset times.
      • Weather: Provides daily weather updates.
      • Calendar: Syncs with iCloud calendars using a guide from the MagicMirror forum.
    • Features a custom wallpaper styled using a custom.css file.
    • Serves as a highly functional addition to my workspace, helping me stay organized and productive.

πŸ‘©β€πŸ« WiCyS Mentorship Program

Participating in this 9-month mentorship program to develop professional skills and advance my expertise in cybersecurity.

Month Topic Key Focus Areas
October Welcome and Goal Setting - Introductions, goal setting, and group meeting cadences.
- Discussed inclusivity, mentoring strategies, and personal/professional development goals.
- Utilized materials like the WiCyS Goal Setting Worksheet and inclusive language resources.
November Influence - Explored body language, authority, and strategies for impactful communication.
- Reviewed articles and podcasts on leadership and influence.
- Participated in CyberGEN.IQ assessments and discussions.
December Branding, Self-Presentation & CyberGEN.IQ - Focused on resume reviews, LinkedIn tips, and creating elevator pitches.
- Evaluated personal branding and body language for self-presentation in cybersecurity.
- Attended webinars on understanding CyberGEN.IQ results and aligning goals.
January Negotiation - Personal experiences negotiating salary/roles and lessons learned.
- Overcoming bias and self-doubt in negotiations.
- Key strategies for successful job offer negotiations.
- Evaluating self-worth and knowing when to walk away.
February Work-Life Balance & Preparing for Speaking Opportunities - Strategies for improving work-life balance.
- Cultural differences in work-life balance expectations.
- Shifting perceptions of working women, particularly women of color.
- Advocating for better policies in workplaces.

Advanced to Tier 3 of this competitive, multi-tiered scholarship program aimed at identifying and developing cybersecurity talent.

  • Tier 1: Participated in the SANS BootUp CTF challenge hosted on the Ranges.io platform. Placed 363rd out of 2000 participants to advance to Tier 2.
  • Tier 2: Completed structured TryHackMe learning paths (Intro to Cybersecurity, Pre-Security, Jr. Pen Tester, and Cybersecurity 101) and participated in a CTF challenge. Advanced to Tier 3 as one of 350 participants.
  • Tier 3: Completed the CyberGen.iQ assessment, which evaluated critical thinking and personality traits. Advancement to Tier 4 will depend on Tier 1 and Tier 2 performance, along with the essay submitted in the initial application. cybergeniq results
  • Final Status: Did not advance to Tier 4, but gained valuable experience in CTFs and cybersecurity learning paths.

Pinned Loading

  1. bastet27 bastet27 Public

  2. HomeLab HomeLab Public

    Project folder for Home Lab write ups.

  3. THM-Advent-of-Cyber-2024 THM-Advent-of-Cyber-2024 Public

    Write-ups for the TryHackMe Advent of Cyber 2024 challenges, providing detailed explanations and solutions for each day.

  4. Tier2-WiCys-CTF-2024 Tier2-WiCys-CTF-2024 Public

    WiCys Stage 2 CTF challenge.