
Hamad Alnakal
Computer Science at University of Technology Bahrain (UTB)
Bahrain
Hi, I'm Hamad Alnakal!
Computer Science at University of Technology Bahrain (UTB)
I've grown up with computers, and I've developed a deep interest in the fields of cyber security and networking. I have spent a lot of time searching for answers to the unknown, and evolving as a “Security Researcher - Penetration Tester - Ethical Hacker”.
Experience
No experience added
Education
Certificates & Badges
No certificates or badges added
Projects
Network Security & Penetration Testing
•https://www.linkedin.com/posts/hamad-alnakal_network-security-penetration-testing-activity-6910542529998290944-RWT-?utm_source=linkedin_share&utm_medium=ios_appLab Walkthrough
The primary focus of this assignment was to get up to speed with newer and more complex vulnerabilities and learning the usage of different tools or methods to exploit them, thereby improving and developing my penetration testing skillset. My scope was not restricted in the selection of systems or performing exploitation or post-exploitation. It was encouraged to perform the same and learn the usage of newer tools and technologies, which is a highly essential practical experience for a penetration tester.
Malware Reverse Engineering Analysis
The malware is a form of ransomware identified as the Ryuk ransomware. When the ransomware is run it kills a list of processes and drops readme files in several directories and encrypts most files.
Malware Reverse Engineering Analysis
The trojan belonging to the Carberp family of trojans. The malware repeatedly sends requests over the network to three different Command and Control(C&C) servers. The malware does not appear to perform any malicious activity without first successfully connecting to one of the C&C servers.
Mirai Botnet
•https://www.linkedin.com/posts/hamad-alnakal_mirai-botnet-analysis-activity-6890318061438590976-kGTVMalware Analysis Report
In this project I will be discussing about the Mirai Botnet malware which is utilized for the DDOS attack is a part of a Trojan IoT malware. It was first discovered in May-2016 and the initial malware was Linux.DDoS.87, then another variant named Linux.DDoS.89 and finally Linux.Mirai that was discovered in the month of August-2016. The Mirai malware is responsible for infecting at least 500,000 IoT devices in almost 164 countries, making bots and launching DDoS attacks globally. DDoS attacks on KrebsOnSecurity, French web host OVH and Dyn in the year 2016 are the largest DDoS attacks ever know till date, these attacks were initiated using the Mirai malware which scans for the unsecured IoT devices and then uses them as a launch platform for DDoS attacks.
Languages
Arabic
Professional
English
Professional
Skills
Penetration Testing
Cyber Security Analyst
Cyber Security Consultant
Ethical Hacking
Network Security