magunloye1/cybersecurity-portfolio

GitHub: magunloye1/cybersecurity-portfolio

一个涵盖事件响应、身份管理、威胁分析和Web安全的综合网络安全实战作品集,展示了从实验室搭建到攻击检测再到加固防御的完整技能体系。

Stars: 1 | Forks: 0

# 网络安全作品集 专注于事件响应、漏洞管理、IAM 以及威胁监控与分析的网络安全实战项目。 # 你好,我是 Marvelous Agunloye 专注于事件响应、数字取证和身份安全的网络安全毕业生——在 Windows、Linux 和混合云环境中拥有丰富的实践经验。 ![GIAC](https://img.shields.io/badge/GIAC%20Certified%20(8×)-0078D4?style=flat&logoColor=white) ![Threat Detection](https://img.shields.io/badge/Threat%20Detection%20%26%20IR-1D9E75?style=flat&logoColor=white) ![IAM](https://img.shields.io/badge/IAM%20%26%20Entra%20ID-7F77DD?style=flat&logoColor=white) ![Platforms](https://img.shields.io/badge/Windows%20%26%20Linux-888780?style=flat&logoColor=white) ![Cloud](https://img.shields.io/badge/Azure%20%26%20AWS-BA7517?style=flat&logoColor=white) ## 📖 作品集概述 本作品集展示了**实践实验室、威胁研究和技术文档的均衡结合**,提供了以下方面的真实案例: - 威胁检测与事件响应 - 漏洞管理和系统加固 - 混合身份与访问控制实施 - 安全文档的分析与报告撰写技能 ## 🛠 技能、专注领域与工具集 - **平台:** Windows Server, Linux, Azure, AWS - **事件响应与数字取证:** 日志分析、数据包捕获、恶意软件检查 - **身份与访问管理 (IAM):** Active Directory 和 Entra ID 配置 - **系统管理:** Windows Server, Linux, 混合环境,加固技术 - **威胁监控与分析:** 蜜罐、网络监控 - **工具:** Wazuh, Security Onion, Zeek, Wireshark, Metasploit, John the Ripper, Hashcat, tcpdump - **脚本与自动化:** Python, Bash, PowerShell ![Python](https://img.shields.io/badge/Python-3670A0?style=flat&logo=python&logoColor=white) ![Bash](https://img.shields.io/badge/Bash-4EAA25?style=flat&logo=gnubash&logoColor=white) ![PowerShell](https://img.shields.io/badge/PowerShell-5391FE?style=flat&logo=powershell&logoColor=white) ![Wazuh](https://img.shields.io/badge/Wazuh-00A9E0?style=flat&logo=wazuh&logoColor=white) ![Security Onion](https://img.shields.io/badge/Security%20Onion-2E7D32?style=flat&logoColor=white) ![Zeek](https://img.shields.io/badge/Zeek-777BB4?style=flat&logoColor=white) ![Wireshark](https://img.shields.io/badge/Wireshark-017AFF?style=flat&logo=wireshark&logoColor=white) ![tcpdump](https://img.shields.io/badge/tcpdump-2C2D72?style=flat&logoColor=white) ![Metasploit](https://img.shields.io/badge/Metasploit-FF5C00?style=flat&logo=metasploit&logoColor=white) ![Burp Suite](https://img.shields.io/badge/Burp%20Suite-FF6633?style=flat&logo=burpsuite&logoColor=white) ![OWASP ZAP](https://img.shields.io/badge/OWASP%20ZAP-00549E?style=flat&logo=owasp&logoColor=white) ![Hashcat](https://img.shields.io/badge/Hashcat-A9225C?style=flat&logoColor=white) ![MITRE ATT&CK](https://img.shields.io/badge/MITRE%20ATT%26CK-E31837?style=flat&logoColor=white) ![Active Directory](https://img.shields.io/badge/Active%20Directory-0078D4?style=flat&logo=microsoft&logoColor=white) ![Entra ID](https://img.shields.io/badge/Entra%20ID-0078D4?style=flat&logo=microsoft&logoColor=white) ![Windows](https://img.shields.io/badge/Windows-0078D4?style=flat&logo=windows&logoColor=white) ![Linux](https://img.shields.io/badge/Linux-FCC624?style=flat&logo=linux&logoColor=black) ![Azure](https://img.shields.io/badge/Azure-0078D4?style=flat&logo=microsoftazure&logoColor=white) ![AWS](https://img.shields.io/badge/AWS-232F3E?style=flat&logo=amazonwebservices&logoColor=white) ## 📁 项目 ### 1. 🖥️ 家庭实验室 — Active Directory 与混合域 - 设计并部署了混合 **Windows + Linux 域环境** - 配置了 **带有 DHCP 和 DNS 的 Active Directory、文件服务器、证书颁发机构、RDS**,并加入了多平台域设备 - 使用 Wazuh 和 Security Onion 实施了基于主机和网络的入侵检测 - 使用 **Metasploit, John the Ripper 和 Hashcat** 进行了漏洞测试和利用 `Active Directory` `Wazuh` `Security Onion` `Metasploit` [阅读更多 →](./System-Hardening/README.md) ### 2. 🍯 蜜罐威胁分析 — IoT 攻击面 - 在 **Raspberry Pi 4** 上设置并部署了一个面向互联网的蜜罐,配置了 SANS Cowrie 服务器和自定义日志 - 监控并捕获了针对 IoT 设备的攻击,执行了流量分析并提取了恶意软件 payload - 将观察结果映射到 MITRE ATT&CK 技术并记录了预防策略 - 撰写了一篇关于多态文件滥用以进行隐蔽 payload 交付的配套深入分析文章 `Cowrie` `MITRE ATT&CK` `Wireshark` `Malware Analysis` - **详细的观察与分析:** - [攻击观察 →](Honeypot-Threat-Analysis/Observations.md) - [关于多态文件研究的博客文章:当 GIF 不仅仅是 GIF 时 →](./BlogPosts/WhenAGIFIsntJustAGIF.md) ### 3. ☁️ 云 IAM — Azure 与 AWS 安全配置 - 在 Azure Entra ID 和 AWS 环境中配置了 IAM 策略、条件访问和身份治理。 - 探索了 AD 和 Entra ID 集成、用户生命周期管理、MFA 强制执行以及系统加固最佳实践 `Azure Entra ID` `AWS IAM` `Conditional Access` ### 4. 🌐 Web 应用程序安全 — Hometrumpeter Inc. - 协助进行了符合 OWASP Top 10 的真实世界安全评估。 - 识别并记录了与以下相关的问题: - 身份验证和授权漏洞 - 输入验证和注入风险 - 通过手动和自动测试发现的不安全配置 - 为开发团队提供了带有可操作修复指导的风险评级发现 ![Python](https://img.shields.io/badge/Python-3776AB?style=flat&logo=python&logoColor=white) ![Burp Suite](https://img.shields.io/badge/Burp%20Suite-FF5722?style=flat&logo=burpsuite&logoColor=white) ![OWASP ZAP](https://img.shields.io/badge/OWASP%20ZAP-0C4DA2?style=flat&logo=owasp&logoColor=white) ![MITRE ATT&CK](https://img.shields.io/badge/MITRE%20ATT--CK-FF0000?style=flat) ![Linux](https://img.shields.io/badge/Linux-FCC624?style=flat&logo=linux&logoColor=black) ![Git](https://img.shields.io/badge/Git-F05032?style=flat&logo=git&logoColor=white) [阅读更多 →](./Web-App-Security/README.md) ## 博客:当 GIF 不仅仅是 GIF 时 - 分析用于 IoT 设备中隐蔽恶意软件交付的多态文件 - 演示了 RCE payload 检测、文件提取和防御措施 [阅读博客 →](BlogPosts/WhenAGIFIsntJustAGIF.md) ## 🔗 认证 | 认证 | 颁发机构 | 状态 | |---|---|---| | GCFE — Certified Forensic Examiner | GIAC | ✅ [验证](https://www.credly.com/badges/6b27b413-e4eb-42ac-a6c9-5c755b8272ae/public_url) | | GMON — Threat Detection & Monitoring | GIAC | ✅ [验证](https://www.credly.com/badges/3ccdafed-be03-498b-a217-086d0bc8d194/public_url) | | GCIA — Certified Intrusion Analyst | GIAC | ✅ [验证](https://www.credly.com/badges/1140c87d-8fdb-40c1-bc76-5b5dba6124c3/public_url) | | GCIH — Certified Incident Handler | GIAC | ✅ [验证](https://www.credly.com/badges/87598346-8263-48e6-ae87-73a2a64d5765/public_url) | | GSEC — Security Essentials | GIAC | ✅ [验证](https://www.credly.com/badges/bdb5d38d-5a6f-4d2e-8ab4-7f8c2ea6b771/public_url) | | GPYC — Python Coder | GIAC | ✅ [验证](https://www.credly.com/badges/0e5a995e-3c7e-4ad5-b17d-c9cf4ed3f90d/public_url) | | GFACT — Foundational Cybersecurity Technologies | GIAC | ✅ [验证](https://www.credly.com/badges/aa8e5ff3-d268-40ec-8163-246c705b865c/public_url) | | GISF — Information Security Fundamentals | GIAC | ✅ [验证](https://www.credly.com/badges/bcaa2d68-6a6a-4860-b016-9e73f4cdeee0/public_url) | | CompTIA Network+ | CompTIA | ✅ [验证](https://www.credly.com/badges/236a9ccc-8e5a-48de-9efe-96fb3f195e9c/public_url) | | CompTIA A+ | CompTIA | ✅ [验证](https://www.credly.com/badges/9979cc3b-95b6-45da-9a14-55fc7b5f61c9/public_url) | | SC-900 — Security, Compliance & Identity | Microsoft | ✅ 已认证 | | AZ-900 — Azure Fundamentals | Microsoft | ✅ [验证](https://www.credly.com/badges/4152e791-fdc2-4037-abaa-9af30ac0cdbb) | | DP-900 — Azure Data Fundamentals | Microsoft | ✅ [验证](https://www.credly.com/badges/00b9fc8b-7001-4369-ba17-4c87be11ed84) | | SC-300 — Identity & Access Administrator | Microsoft | ⏳ 进行中 | | GWAPT — Web App Penetration Testing and Ethical Hacking | GIAC | ⏳ 进行中 | [证书验证 →](Certifications/README.md) ## 保持联系 我正在积极寻找 SOC 分析、事件响应和身份安全方面的职位。如果您正在招聘或只是想聊聊安全,请联系我。 [![LinkedIn](https://img.shields.io/badge/LinkedIn-0078D4?style=flat&logo=linkedin&logoColor=white)](https://www.linkedin.com/in/marv-wip) [![GitHub](https://img.shields.io/badge/GitHub-24292e?style=flat&logo=github&logoColor=white)](https://github.com/magunloye1)
标签:Active Directory, AI合规, Awesome, AWS, Azure, Bash, DAST, DPI, Entra ID, GIAC认证, GPT, IAM, IPv6, Plaso, PowerShell, Python, Rootkit, Security Onion, Terraform 安全, Wazuh, Windows Server, Wireshark, Zeek, 句柄查看, 威胁分析, 威胁监控, 安全实验室, 安全项目组合, 应用安全, 恶意软件分析, 抓包分析, 数字取证, 无后门, 混合云, 漏洞管理, 系统加固, 系统管理, 网络安全, 自动化侦查工具, 自动化脚本, 蜜罐, 证书利用, 身份与访问管理, 逆向工具, 隐私保护