Computer and Information Security
Used Hashcat and John the Ripper to crack 20 passwords using custom rules and character sets. Attacked 10 Intel and ARM machines using buffer overflow, ret2libc, string format, and other exploits. Cracked 12 wireless networks using WEP and WPA encryption with arpreplay and chopchop attacks.