Hey , I'm Muhammad Ismail Ramzan 👋

I'm deeply passionate about cybersecurity and graduated in the field. I'm fascinated by technology, particularly the advancements AI brings to the cybersecurity realm. Dive into my blog where you can learn something new today!😊 I'm also quite social, so feel free to get in touch with me anytime.

Linkedin iconHTBletsdefend iconDiscotd iconUpwork icontryhackme iconstackoverflow icongithub icon
Avatar image
printnightmare

PrintNightMare

Sep 30, 2023
Exploiting Windows Print Spooler Vulnerabilities for Privilege Escalation and Remote Code Execution
DCSync

DCSync Attack

Sep 23, 2023
A Deep Dive into Credential Compromise in Active Directory Environments
kerberoasting

Kerberoasting

Sep 16, 2023
Kerberoasting is a method used for lateral movement and privilege escalation within Active Directory environments.
Listing some of My Projects
Project Forensics

I collaborated with my team to conduct forensic investigations on Android systems, extracting and analyzing digital evidence from devices. Together, we compiled detailed reports documenting findings, methodologies, and conclusions, adhering to industry best practices and legal standards.

Forensic Investigation Results:
- Traces of 'msfconsole' detected, indicating potential compromise.
- Unknown APK allowed on the device, from installing a game MOD.
- Entire mobile compromised.
- Malware removal and system restoration was conducted.
- Detailed documentation of Evidences and System Restoration was Provided.

Project IDS
IMU - Intrusion Detection System
React.js (Web Frontend)
Python (Server)
ELK Stack

We designed and implemented an Intrusion Detection System (IDS) utilizing machine learning algorithms, specifically Support Vector Machine (SVM), to detect and thwart cyber attacks effectively. The system was tailored to monitor network traffic, with a particular emphasis on DMZ traffic, and it prioritized the detection of insider threats by identifying malicious activities. Its primary function was to alert administrators promptly upon identifying potential threats, enabling proactive response measures to mitigate risks effectively.

Visual Crypto
Visual Cryptography
React.js
Python (Flask)
TypeScript

During our collaborative project, we undertook the successful implementation of Visual Cryptography, a cryptographic technique that enhances security by dividing images into shares, making them indecipherable individually but revealing the original image when combined. Alongside this implementation, we developed a user-friendly web interface that served as a proof of concept, showcasing the functionality and effectiveness of our Visual Cryptography solution.

Project AES

I undertook the implementation of the AES (Advanced Encryption Standard) algorithm from scratch using Python, as part of a personal project. This endeavor aimed to deepen my understanding of cryptography and the mathematical principles underlying the AES algorithm. Subsequently, I integrated this implementation into a chat application, leveraging encryption to enhance the security of communication between users.

Bus Management System

This project was specilized in managing the bus system. It was designed to provide a user-friendly interface for bus operators to manage their fleet, routes, and schedules effectively. The system was also tailored to provide passengers with a seamless experience, enabling them to book tickets, track buses in real-time, and receive notifications regarding delays or cancellations. The system was developed using a microservices architecture, ensuring scalability and robustness.

Bloackchain Bus Management System
PeerCab - Blockchain Based Ride Sharing Platform
Blockchain/Ethereum
Node/Express
React Native

This project was designed to revolutionize the ride-sharing industry by leveraging blockchain technology to enhance security, transparency, and trust between drivers and passengers. The platform was developed to facilitate peer-to-peer transactions, enabling users to share rides securely and efficiently. The implementation of smart contracts and decentralized storage ensured that transactions were tamper-proof and that user data was protected from unauthorized access.

Certs & Achievements
Udemy Security+lets defendNescon
Upwork ReactTryhackme All pathsNescon
HTB SessionTryhackme All pathsNescon
Once Again, Feel Free to Contact Me :)
Linkedin icondiscord icon
Built with ♥