Cybersecurity Contributions and Projects

Major Contributions

Discord Malware Analysis: EclipseOfLegends

Comprehensive analysis of malicious behavior in files shared via Discord. Key findings include:

Tools used include YARA, ProcMon, and capa.

Hybrid Analysis Report

A detailed analysis of the sample associated with "EclipseOfLegends" was conducted using Hybrid Analysis. The sample (hash: df46dbe66498cd0d9ea8cc62c693172943bc91ff200c06617aa1f5503dae7976) revealed the following findings:

The full Hybrid Analysis report can be accessed here.

OSINT Investigation: Reporting Hosting Services for Illegal Content

Conducted Open Source Intelligence (OSINT) research to identify 9 discord servers and reporting 160 websites hosting or distributing illegal pornographic content. Collaborated with hosting providers to ensure these websites and server's were taken down efficiently within legal frameworks as well as contributing actionable intelligence to law enforcement.

Key Achievements:

Tools and Techniques Used:

Twitch Chat Moderation and Regular Expression Development

As a Twitch chat moderator for multiple streamers, I developed numerous regular expressions to filter out spam, malicious links, and inappropriate content. These expressions helped maintain a positive and safe environment for the community by automatically identifying and removing harmful messages.

Examples of Regular Expressions:

(?i)(^(best|b\se\ss\st) (viewers|v\si\se\sw\se\sr\ss) (on|o\s))\b([w-wW-W][a-aA-A][n-nN-N][n-nN-N][a-aA-A]\s[b-bB-B][e-eE-E][c-cC-C]
[o-oO-O][m-mM-M][e-eE-E]\s[f-fF-F][a-aA-A][m-mM-M][o-oO-O][u-uU-U][s-sS_S].<>\s[b-bB-B][u-uU-U][y-yY-Y]\s([p-pP-P][r-rR-R][i-iI-I][m-mM-M]
[e-eE-E][s-sS-S]|[f-fF-F][o-oO-O][l-lL-L][l-lL-L][o-oO-O][w-wW-W][e-eE-E][r-rR-R][s-sS-S]|[v-vV-V][i-iI-I][e-eE-E][w-wW-W][e-eE-E]
[r-rR-R][s-sS-S]|[v-vV-V][i-iI-I][e-eE-E][w-wW-W][s-sS-S]))\b

These contributions streamlined moderation tasks, reducing manual interventions and ensuring real-time enforcement of community guidelines.

Highlighted Cybersecurity Tools

These extensions showcase my practical contributions to cybersecurity during my SOC analyst internship. Each tool addresses inefficiencies in manual workflows, saving time for security professionals and streamlining threat analysis processes. By automating repetitive tasks like IP checks, Event ID lookups, and IOC searches, these tools demonstrate my problem-solving skills and focus on practical cybersecurity applications.

Abuse IP Check Extension

This Firefox extension facilitates quick lookups of IP addresses on AbuseIPDB, enabling security professionals to identify malicious activity efficiently. Designed with network administrators and SOC analysts in mind, it streamlines the process of assessing the trustworthiness of IP addresses without needing direct access to AbuseIPDB's web interface. Unique features include handling direct IP lookups and simplifying threat detection workflows.

Shodan Lookup Extension

This tool allows users to perform real-time IP address and domain investigations on Shodan. Security analysts can retrieve detailed device and network information instantly, enhancing threat intelligence capabilities. The extension processes user-selected text for IP addresses or domains, transforming it into actionable insights via Shodan's search capabilities. It's an indispensable resource for deep-dive device reconnaissance.

VirusTotal Lookup Extension

The VirusTotal Lookup extension streamlines the identification of malware by searching URLs, domains, and file hashes on VirusTotal. Security researchers benefit from its ability to handle complex redirects and provide immediate access to VirusTotal's threat intelligence database. It's an essential tool for anyone conducting malware analysis or IOC verification.

Windows Security Event Log Lookup

This extension supports SOC analysts and system administrators in investigating Windows security logs. By quickly retrieving detailed information on selected Event IDs, it eliminates the need for manual searches in documentation, making log analysis more efficient and precise.

Network and Security Tools

ARP Spoofer

Automates ARP spoofing attacks, redirecting traffic on local networks to monitor or intercept communications. This tool is effective for simulating man-in-the-middle (MITM) scenarios and identifying security weaknesses in ARP protocols.

ARP Spoof Detector

Helps identify and prevent ARP spoofing attacks on local networks. By monitoring for unusual ARP activity, it aids in maintaining the integrity of network communications.

Code Injector

Injects arbitrary code into network traffic to simulate exploitation scenarios. Useful for testing application robustness and identifying vulnerabilities in poorly secured systems.

DNS Spoofer

Redirects DNS queries to a specified IP, enabling researchers to study how devices behave when presented with malicious DNS responses. A valuable tool for analyzing DNS security.

File Interceptor

Captures files transmitted over network protocols, providing insights into potential data exfiltration risks during an active MITM attack.

MAC Changer

Alters the MAC address of a network interface for anonymity and testing purposes. Ideal for bypassing network restrictions or simulating scenarios involving device spoofing.

Network Scanner

Scans a specified subnet to identify active hosts and retrieve their IP and MAC addresses. This tool supports reconnaissance tasks and helps network administrators maintain an up-to-date inventory of connected devices.

Packet Sniffer

Monitors network traffic in real-time, capturing HTTP requests and filtering for login credentials. Aids in analyzing unsecured traffic and evaluating the risk of sensitive information being exposed.

System Monitoring Scripts

These tools are designed to enhance system performance monitoring and simplify troubleshooting: