Hi there! I’m Toree McIntyre, a passionate cybersecurity and network professional! I have hands-on experience in threat analysis, risk management, and network security; I bring a strong foundation in collaboration technologies and technical problem-solving.
✨
📚 I'm currently learning Linux, data structures, and building on my networking skills ...
🎯 Goals: projects for learning
This project, conducted as part of my studies at Western Governors University, aimed to identify and analyze network vulnerabilities and anomalies using Nmap and Wireshark in a virtual lab environment. The objective was to uncover potential security risks within the network by conducting a comprehensive scan and traffic analysis. The findings from this analysis were used to inform recommendations to enhance the network's security posture, protecting it against emerging threats.
The project demonstrates the practical application of network mapping and monitoring tools in maintaining cybersecurity, with a focus on real-world scenarios and proactive defense strategies.
- Tools Used: Nmap, Wireshark
- Focus Areas: Vulnerability scanning, network topology analysis, traffic inspection, threat identification
- Outcome: Enhanced security recommendations for the network, protection against potential exploits
This project involves analyzing a network topology using Nmap and identifying vulnerabilities associated with various systems. Below are the images and their corresponding descriptions that detail the analysis.
This image shows the star topology identified during the Nmap scan. The central node is the localhost, with six machines connected.
This screenshot shows the Nmap scan results for the Linux machines in the network. The machines are running on OS version 2.6.32 and are connected to IPs 10.168.27.14, 10.168.27.15, and 10.168.27.132.
This image depicts the scan results for Windows servers in the network. It highlights the open ports and possible vulnerabilities in Windows Server 2012 and 2008.
This screenshot captures the SSH traffic analyzed using Wireshark. The image is linked to vulnerabilities such as CVE-2024-38510 and CVE 2013-1193.
This image summarizes the details of several vulnerabilities discovered during the analysis, including CVE-2022-0918, CVE-2002-0283, CVE-2024-38510, and CVE 2013-1193, along with their potential impacts and suggested mitigations.
This project highlights the importance of continuous monitoring and proactive security measures in network management. By leveraging tools like Nmap and Wireshark, cybersecurity professionals can effectively detect and mitigate vulnerabilities before they are exploited by malicious actors.
Feel free to explore my other projects and connect with me on LinkedIn!