Keylogger Attack and Detection
Keyloggers are a great way to capture sensitive details and
provide valuable insights on user behavior. In this project,
I explain the steps of deploying a dropper script to download
a keylogger, capturing keystrokes, and using an exfiltration
script to send captured data to an FTP server. I also cover
persistence techniques and conclude with detection methods to
identify these activities. Check it out on my
Github!
Active Defense and Cyber Deception Labs
I completed the Active Defense and Cyber Deception course by Antisyphon Training,
where we focused on using proactive strategies to slow down attackers and gather intel.
The course taught me how to create environments that mislead and confuse adversaries,
giving defenders more time to detect, respond, and attribute malicious actions.
I had the chance to work with techniques like honeypots, spider traps, and canary
tokens, gaining hands-on experience in setting up these deceptive defenses.
You can read more about the course on my Medium
and check out the several labs I completed on my Github.