Maria Rehman
Brockville, Ontario
You have no groups that fit your search
Maria Rehman
7 months ago
Cryptography and Cryptanalysis
Vernam, Vigenère, Caesar, Columnar Transposition DES, AES, RSA, DSA, Hybrid (RSA-AES), CrypTool
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
7 months ago
Web Application Vulnerabilities and Security
Metasploit, Netcat, OWASP ZAP, Burp Suite
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
7 months ago
Constructing Windows User Usage Profile from Microsoft Event Logs
Microsoft Windows 11 Event Logs (Security and System Event Logs), Log Parser Studio 2.0, MS Excel Workbook
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
7 months ago
Pentesting and Defense
Kali, Nmap, Nessus, Hydra, Ncrack, Metasploit, Wireshark, Snort, Iptables
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
7 months ago
Forensic Analysis and Reporting - USB Drive Image
TSK/Autopsy forensic browser, Data Access FTK Imager, QuickStego, Hex Editor
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
7 months ago
Volatile Memory Forensic Analysis - Malware Infected Windows Memory Dump
Volatility, ipvoid.com, virustotal.com, iplocation.net
0 likes · 0 comments
Portfolio & ServicesMaria Rehman
7 months ago
Securing An Enterprise
Vulnerability Triage, Risk based Vulnerability Assessment, Risk Mitigation, ESM System Implementation
CISCO Risk Vulnerability Response Model, Vulnerability Oriented Risk Assessment, Open Security Architecture (OSA) Design Pattern Templates, Security Onion, Inkscape.
0 likes · 0 comments
Portfolio & Services