Welcome

Victor Coil Portfolio/Project Archive

About Me

A bit about me…

Whoami

Hello, and welcome to my site. I am Victor Coil, a cybersecurity enthusiast actively seeking an entry-level position in the Cybersecurity field. I currently hold a bachelor’s degree in Cybersecurity, CompTIA Security+, Cisco CCNA, and am currently studying for the CompTIA CySA+ Certification. I have also furthered my education through a handful of master courses. Outside of the classroom, I participated in the Cybersecurity competitions Hivestorm and the National Cyber League, where I finished in the top 3% of the team’s competition.

My Vision

To become an exceptional Blue Teamer in the Cybersecurity field. I strive to continuously enhance my technical skills and knowledge to be able to effectively defend organizations. I also aim to use this website to share projects, valuable lessons, and advice. In the chance of being able to raise awareness and/or help others with the projects and reports that I make.

Projects

These are the projects i’ve done

Click on the titles to access the lab Documentation or GitHub.

Azure Honeypot

  • Extracted Windows Event Viewer metadata with PowerShell, forwarding it to a third-party API for geodata
  • Configured Azure Log Analytics Workspaces to ingest custom logs containing geodata
  • Visualized global RDP Brute Force attacks on a world map for insights into attack locations and magnitudes

Enhanced Logging and Intrusion Detection

  • Deployed Splunk Enterprise (SIEM) for Centralized logging
  • Enhanced logging using Sysmon
  • Deployed Snort Intrusion Detection Systems (IDS)
  • Forwarded all logs, including Snort logs, using Universal Forwarders

Snort Rules and OWASP Top 10

  • Configured Snort IPS on DVWA webserver to showcase OWASP Top 10 vulnerabilities
  • Demonstrated various web security attacks to highlight practical expertise in threat detection and prevention
  • Developed tailored Snort rules for applicable vulnerabilities

Security Compliance and Monitoring Lab

  • Deployed Wazuh into Active Directory Environment
  • Supported compliance using the CIS Benchmark tool
  • Configured FIM to detect integrity violations on a user’s Desktop directory
  • Configured the Vulnerability Scanning module and scanned the Domain Controller and Windows 10 host

Vulnerability Management Lab

  • Installed and Configured Nessus Essentials within an Active Directory Environment
  • Conducted Non-Credentialed and Credentialed scans for baselining
  • Remediated critical and high vulnerabilities

Active Directory Management

  • Managed an Active Directory environment on Windows Server 2019
  • Implemented and maintained AD DNS and DHCP services
  • Implemented a Remote Access Server to support NAT
  • PowerShell was used to automate the creation of 200+ User Accounts

GitHub

These are the Python projects on my GitHub

  • Network Scanner
  • Phone and Email Web Scraper
  • SSH Bruteforce Script
  • Directory Enumerator
  • Subdomain Enumerator

Potential Upcoming Projects

These are projects that I’m interested in and will most likely explore soon.

  • AWS
  • Elastic Search (ELK Stack)
  • Suricata
  • Lima Charlie
  • Zeek
  • Malware Analysis and Creation

Writeups / Reports

Reports from Tryhackme and Hackthebox rooms

The CVE Number has a link to the actual report created by MITRE while the Name of the Machine/Room is a link to my writeup.

These writeups help me work on my reporting, keeping my technical skill sharp, developing the mindset of an attacker which is crucial for a defender, and being educated on vulnerabilities and exploits used in the past.

Vulnerability: CVE-2015-3306 “mod_copy module”

Tags: Nmap Scan, SMB enumeration, FTP exploit, SSH, and SUID escalation

TryHackMe Room

Vulnerability: CVE-2007-2447 “’Username’ map script’ Command Execution”

Tags: Nmap Scan, SMB exploit/escalation




HackTheBox Room

Steel Mountain

This Report is still being worked on.

Vulnerability:

Tags:

TryHackMe Room