2026-03-06
NIST CSF v2 ↔ ISO 27002:2022 — Mapping Notes
Notes from a mapping project between NIST Cybersecurity Framework v2 and ISO 27002:2022 controls, done during a GRC internship at Enedis. Includes the methodology, key alignment points, and a maturity simulation tool built on top of the mapping.
2025-03-26
ICS/OT Threat Modeling — Three Critical Infrastructure Attacks
Structured threat analysis of three ICS/OT attacks using MITRE ATT&CK for ICS: Stuxnet (2010), Ukraine power grid (2015), and Danish energy sector (2023). Attack chain reconstruction, TTPs mapping, and framework comparison.
2025-01-08
OWASP Juice Shop — Web Application Penetration Testing
Hands-on penetration testing of OWASP Juice Shop across 4 difficulty levels: SQL injection, DOM XSS, CSRF, session manipulation, null-byte bypass, and FTP enumeration. Tools: ZAP 2.15.0, Foxy Proxy.
2025-01-07
Zyxel Firmware Analysis — Extraction, ZIP Cracking, and Credential Recovery
Full firmware analysis of a Zyxel network device: binwalk extraction of a squashfs filesystem, known-plaintext attack on the ZIP encryption with pkcrack, and hashcat-based credential recovery from shadow.basic.
2024-10-21
Memory Forensics with Volatility — WinXP SP2 Dump Analysis
Full walkthrough of a Windows XP SP2 memory dump using Volatility 2.6.1 — 14 plugins covering process enumeration, hidden process detection, network connections, registry artifacts, kernel modules, and live memory inspection via volshell.
2023-09-01
Cerber Ransomware — Static & Dynamic Analysis Lab
Full analysis of a 2017 Cerber sample under Flare-VM and Cuckoo Sandbox — packed and unpacked, behavioral tracing from DLL loading to file encryption, real IoCs.
2023-06-12
Android Fuzzing with Droid-FF and Radamsa
Automated fuzzing of Android .dex files using Droid-FF and Radamsa on a Genymotion emulator. Full triage pipeline: crash detection via logcat, tombstone collection, addr2line symbolization, and crash path analysis through libz.so adler32.