🛡️ DRM Protection System
Created a QR code with a data matrix that allows me to scan it and get metadata of the session ID and OS of the person who leaked the image. This provides forensic tracking capabilities for digital asset protection.
JavaScript
QR Codes
Digital Forensics
Data Matrix
💻 Portfolio Website
Created a website from scratch using HTML, CSS, and JavaScript. Hosted it locally using Docker and used reverse proxies, such as Ngrok, to allow for the ability to test it on multiple other devices both locally and remotely! Since I am the admin, I can monitor network traffic and see who visits my site from logs.
HTML5
CSS3
JavaScript
Docker
Ngrok
Logs
Network Traffic
Reverse Proxies
🐛 Penetration Testing
Used Windows exploits such as the utility man hack to change the utility function on the password screen to allow root access in PowerShell to be able to change the password without knowing the password. If someone had a BIOS password, this wouldn't work; however, most people don't use one! Another local hack I've done requires a USB with bare-bones Windows 10 installed. After loading into the BIOS and using the command "diskpart clean" on the SSD to wipe a hard drive entirely of its data. This is a very common way criminals clear a device completely to be able to access and sell it again!
Windows
PowerShell
Privilege Escalation