Parastus Nghiilwamo

๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜บ๐˜ต๐˜ฉ๐˜ช๐˜ฏ๐˜จ...

๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ | ๐˜š๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜Œ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ช๐˜ฏ๐˜จ

Hey there, Fellow Digital Explorers!! Document

Welcome to my captivating corner of the internet. I'm Parastus Nghiilwamo, a final year student at NUST (Namibia University of Science and Technology), and It is with great pleasure that I present to you a glimpse into my world of expertise, passion, and dedication. Thank you for taking the time to visit my growing blog/portfolio site. I hope my work resonates with you, and I look forward to connecting and collaborating with like-minded individuals who share my goals for technology and its potential to shape our future! :D .

Experience



Skills







๐’ข๐ธ๐’ฏ ๐‘€๐’ด ๐‘…๐ธ๐’ฎ๐’ฐ๐‘€๐ธ


My Projects





Project: Ethernet Cable

Here is an Ethernet cable i made at Voraltex, on my first attempt! :D


My first completed Ethernet cable, assembled during my time at Voraltex. Following industry standards and best practices, I carefully terminated the RJ-45 connector, ensuring each wire was precisely aligned and secured according to the T568B color sequence.

I utilized essential tools like a cable stripper for clean wire preparation, a crimping tool for securely terminating the RJ-45 connector, and a cable tester to verify connections and troubleshoot any errors, which in my case, there weren't any. ๐Ÿ˜Ž

Coming Soon..โšก

come back later to see what i'm working/worked on :*

Project: Docker Bench Security Tool

Docker Configuration Auditing with Docker Bench Security Script

The Docker-bench for Security tool is an open-source script which analyzes numerous standard best-practices when deploying Docker containers in a production environment. The fully automated tests are designed to locate issues with your configuration based on the CIS Docker Benchmark v1. 3.1 standards.

Installing and running Docker Bench security tool

git clone https://github.com/docker/docker-bench-security.git



CD Into directory

cd docker-bench-security



Run the script

Docker-Bench-Security v1.3.6 loads. Wait for a few seconds; the status of the current Docker configuration is displayed, as shown in the screenshot below.



Results

The [WARN] line in red color indicates the security warning, and the configuration needs to be changed according to the provided information.

The [INFO] line in blue color provides information about the security.

The [PASS] line in green color shows the escaped configuration test.

These warnings can be resolved by configuring Docker daemon securely. The Docker daemon is a service to run Docker. This service can be configured using the JSON file, which is useful for keeping all docker configurations.

โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”โ€”

-๐Ÿฌ๐Ÿต/๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ

Project: Miradore

Mobile Device Management with Miradore, a cloud-based MDM solution

In this project, I demonstrate how to implement mobile device security using the Miradore Mobile Device Management (MDM) solution. This lab covers key aspects of deploying, securing, monitoring, and managing mobile devices using Miradore's cloud-based MDM solution. ๐Ÿ“ฑ๐Ÿ› ๏ธ

With the rise of BYOD (Bring Your Own Device) policies in organizations, it is critical to implement robust mobile security solutions. Miradore offers an effective MDM platform to control and secure company-owned and employee-owned devices, reducing support costs and mitigating potential security risks. This project simulates a scenario where security professionals must utilize Miradore to manage mobile devices in a work environment.

Setting up Miradore Online MDM Solution

I registered for a Miradore account and activated the service here ; https://online.miradore.com/login/Register2

& Complete the registration process.



Enrolling a Device (Client)

To do this, I installed the Miradore Online Client app on the Android machine. In the Miradore dashboard, I created a user profile for this device, inputting details such as the userโ€™s name and email. This profile would allow the device to be associated with a user in the company.

(To manage IOS and MacOS devices, you need to connect Miradore to the apple Push Notification service. this can help : https://youtu.be/djP5D72rqrc )

Once the user was created, I generated enrollment credentials within the Miradore dashboard. These credentials were then entered into the Adroid deviceโ€™s Miradore client app, which connected the device to the cloud platform. The connection was confirmed, and the device was successfully enrolled, allowing me to remotely manage it through the dashboard.



Device Management

With the Android device enrolled and secured, I returned to the Miradore dashboard to explore the various management options available for the device. The dashboard provided real-time information about the device, including its status, location, and the last synchronization time with the cloud platform. This information is invaluable for security professionals looking to monitor devices actively.



Remotely Resetting Passcode

One of the key features of Miradore MDM is the ability to remotely reset a device's passcode.

I used the Reset Passcode function. In the dashboard, I selected the Android device and reset its passcode. This can be done either by sending the new passcode to the user or viewing it directly as an administrator. This feature is useful for assisting users who forget their device passcodes.



Locking a Lost/Stolen Device

An essential feature of any MDM solution is the ability to secure a lost or stolen device. To simulate this scenario, I used Miradoreโ€™s Lost Mode to lock the enrolled Android device remotely. By accessing the Security section in the dashboard, I was able to activate Lost Mode, which rendered the device unusable until it was unlocked by an administrator.

A Black screen will be displayed n the device, indicating the device has been locked and blocked



Closure

This project highlights the practical use of the Miradore MDM solution to manage and secure mobile devices in an enterprise environment. From the initial setup and enrollment of devices to advanced security features like resetting passcodes and locking lost devices, Miradore proves to be an invaluable tool for organizations looking to secure their mobile infrastructure. By leveraging the cloud-based MDM system, administrators can reduce downtime, improve device security, and protect sensitive company data from unauthorized access.

-๐Ÿฌ๐Ÿต/๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ

Project: AWS Fortune Teller๐Ÿช„

BUILT A FORTUNE teller application using AWS LAMBDA and API GATEWAY, that responds to user questions

Now, this application can't actually tell your fortune and you probably shouldnt take any advice from it, But what you can do is ask any question that you like, and the application will tell you yes or no. ๐Ÿ˜



Access here:(took this link down)

Project: Distributed System with Ballerina

Performance Management System with GraphQL and Ballerina

For a school assignment, I collaborated on a comprehensive performance management system for a simulated university department, showcasing expertise in ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต๐—ค๐—Ÿ API design, Ballerina programming, and database integration (MySQL & MongoDB).

My tasks included defining GraphQL schemas, implementing client-server interactions in Ballerina, and contributing to a scalable performance tracking architecture.<

Building a Scalable Healthcare Scheduling System Using Microservices and Kafka

I've also engineered a microservices system to streamline specialist appointments requests. I designed and implemented communication within the microservices utilizing ๐—ž๐—ฎ๐—ณ๐—ธ๐—ฎ messaging, managed MongoDB/SQL database persistence, and built containerized services with ๐——๐—ผ๐—ฐ๐—ธ๐—ฒ๐—ฟ.

Overall, exploring Ballerina has been a rewarding experience, and I gained valuable insights into its capabilities. :)



Project: Securing Systems with OSSEC

Built a Dynamic Intrusion Prevention System with OSSEC

In response to the ever-evolving threat of cyberattacks, I engineered a robust ๐™„๐™ฃ๐™ฉ๐™ง๐™ช๐™จ๐™ž๐™ค๐™ฃ ๐™‹๐™ง๐™š๐™ซ๐™š๐™ฃ๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฎ๐™จ๐™ฉ๐™š๐™ข (๐™„๐™‹๐™Ž) utilizing the capabilities of OSSEC. Within this simulated network setup, I meticulously configured an OSSEC agent on a Debian-based ๐…๐“๐ ๐ฌ๐ž๐ซ๐ฏ๐ž๐ซ, enabling it to closely monitor system logs, file integrity, and potential malicious activity. To proactively safeguard this server, the IPS dynamically integrated with an ๐—ข๐—ฆ๐—ฆ๐—˜๐—– ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ for threat detection and automated countermeasures.





Testing the Defences:

To frankly demonstrate the effectiveness of my IPS implementation, I orchestrated a simulated ๐›๐ซ๐ฎ๐ญ๐ž-๐Ÿ๐จ๐ซ๐œ๐ž ๐š๐ญ๐ญ๐š๐œ๐ค scenario using a Windows client-machine. As the attack unfolded, OSSEC diligently monitored for suspicious behavior, generating detailed alerts and successfully triggered my pre-configured response to effectively ๐™—๐™ก๐™ค๐™˜๐™  ๐™ฉ๐™๐™š ๐™–๐™ฉ๐™ฉ๐™–๐™ ๐™š๐™ง'๐™จ ๐™„๐™‹ ๐™–๐™™๐™™๐™ง๐™š๐™จ๐™จ. This swift action safeguarded the FTP server from unauthorized access and potential data compromises.



I closely documented the entire attack workflow, revealing how OSSEC's precise alerts and decisive preventive capabilities shielded the system against exploitation. Working on this project has been an absolute blast! ~

Project: FortiGate 7.4

LAN Interface Configuration


Configuring the LAN Interface:

The project kicked off by configuring the LAN interface, the gateway to my local network. It involved defining the Alias, Interface type, and IP address, subnet mask, and other crucial settings for this interface.

DHCP Server


Simplifying Network Administration with DHCP:

The second task was setting up a DHCP server on the FortiGate firewall, automating IP address assignment and simplifying network administration.

Static Route Configuration

Ensuring Network Reach with Static Routes:

I skillfully configured the default route, specifying the gateway IP address that directs traffic beyond the local network, guaranteeing proper internet and external network accessibility. Furthermore, I actively monitored the default route using diagnostics to ensure its proper functionality.

Antivirus Configuration


Protecting the Network with Antivirus and Web Filtering:

I set up an Antivirus Profile on FortiGate and tested its effectiveness using the EICAR test file. Web filtering was also implemented to prevent network congestion, boost employee productivity, and block inappropriate content.

Application Control


Controlling Applications and Securing Remote Access:

I utilized application control to manage and monitor specific applications within the network. I also configured IPsec VPNs for secure remote access and followed best practices for SSL VPN configuration to ensure maximum security.

System Maintenance

FortiGuard Security Fabric




Maintaining System Health and Unifying Security:

Regular system maintenance and monitoring tasks were crucial for optimal FortiGate operation. Additionally, I leveraged the FortiGuard Security Fabric to integrate various security components, using cloud logging to enhance threat analysis.

FortiGuard Security Fabric

Overall, exploring FortiGate 7.4 has been a rewarding experience, and I gained valuable insights into its capabilities. :)



โ€” 04/2024

Project: Applocker

Exploring Applocker: A Windows Security Program for Controlling User Access

In this project, I explored how to use the built-in Windows security program, Applocker, to control which applications users can run.

I'll cover the basics of setting up AppLocker rules using Group Policy Management and provide step-by-step instructions on how to enable Application Identity and create new rules.

Understanding Applocker

Applocker is a powerful tool that allows administrators to control which applications can be run on a Windows system by creating rules that exclude certain executables, windows installer files, and DLLs from running. The default rules are based on paths, with all files under those paths being included in the list of allowed apps.

uwu

Applocker Rules Using Group Policy Management
uwu

Set up AppLocker rules using Group Policy Management in a domain environment. The process involves opening the Group Policy Management window, navigating to the appropriate GPO settings, and implementing new rules for allowing or denying certain applications.



Enabling Application Identity

In order to use Applocker effectively, you need to enable the Application Identity setting on your system. This section explains how to do this by configuring a Group Policy object (GPO) with specific settings related to defining and enforcing AppLocker policies.

owo

Creating New Rules for Applocker

Once you've enabled Application Identity, you can create new rules for Applocker that will allow or deny specific applications based on your organization's security needs.

uwu

scroll down under the left sidebar and navigate to Computer configuration -> Policies -> Windows Settings -> Security Settings -> Application Control Policies. Expand Application Control Policies, select and click on AppLocker.

uwu
uwu
uwu

Denied Access to the selected service.

Closure

In order to use Applocker effectively, you need to enable the Application Identity setting on your system. This section explains how to do this by configuring a Group Policy object (GPO) with specific settings related to defining and enforcing AppLocker policies.

uwu

-๐Ÿฌ๐Ÿต/๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ

Project: Applocker

Exploring Applocker: A Windows Security Program for Controlling User Access

In this project, I explored how to use the built-in Windows security program, Applocker, to control which applications users can run.

I'll cover the basics of setting up AppLocker rules using Group Policy Management and provide step-by-step instructions on how to enable Application Identity and create new rules.

Understanding Applocker

Applocker is a powerful tool that allows administrators to control which applications can be run on a Windows system by creating rules that exclude certain executables, windows installer files, and DLLs from running. The default rules are based on paths, with all files under those paths being included in the list of allowed apps.

uwu

Applocker Rules Using Group Policy Management
uwu

Set up AppLocker rules using Group Policy Management in a domain environment. The process involves opening the Group Policy Management window, navigating to the appropriate GPO settings, and implementing new rules for allowing or denying certain applications.



Enabling Application Identity

In order to use Applocker effectively, you need to enable the Application Identity setting on your system. This section explains how to do this by configuring a Group Policy object (GPO) with specific settings related to defining and enforcing AppLocker policies.

owo

Creating New Rules for Applocker

Once you've enabled Application Identity, you can create new rules for Applocker that will allow or deny specific applications based on your organization's security needs.

uwu

scroll down under the left sidebar and navigate to Computer configuration -> Policies -> Windows Settings -> Security Settings -> Application Control Policies. Expand Application Control Policies, select and click on AppLocker.

uwu
uwu
uwu

Denied Access to the selected service.

Closure

In order to use Applocker effectively, you need to enable the Application Identity setting on your system. This section explains how to do this by configuring a Group Policy object (GPO) with specific settings related to defining and enforcing AppLocker policies.

uwu

~๐Ÿฌ๐Ÿต/๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ