Maria Rehman
Brockville, Ontario
Maria Rehman
2 years ago
Cryptography and Cryptanalysis
Vernam, Vigenère, Caesar, Columnar Transposition DES, AES, RSA, DSA, Hybrid (RSA-AES), CrypTool
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
2 years ago
Web Application Vulnerabilities and Security
Metasploit, Netcat, OWASP ZAP, Burp Suite
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
2 years ago
Constructing Windows User Usage Profile from Microsoft Event Logs
Microsoft Windows 11 Event Logs (Security and System Event Logs), Log Parser Studio 2.0, MS Excel Workbook
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
2 years ago
Pentesting and Defense
Kali, Nmap, Nessus, Hydra, Ncrack, Metasploit, Wireshark, Snort, Iptables
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
2 years ago
Forensic Analysis and Reporting - USB Drive Image
TSK/Autopsy forensic browser, Data Access FTK Imager, QuickStego, Hex Editor
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
2 years ago
Volatile Memory Forensic Analysis - Malware Infected Windows Memory Dump
Volatility, ipvoid.com, virustotal.com, iplocation.net
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
2 years ago
Securing An Enterprise
Vulnerability Triage, Risk based Vulnerability Assessment, Risk Mitigation, ESM System Implementation
CISCO Risk Vulnerability Response Model, Vulnerability Oriented Risk Assessment, Open Security Architecture (OSA) Design Pattern Templates, Security Onion, Inkscape.
0 likes · 0 comments
Portfolio & Services