Rukshana Alikhan

// cybersecurity student @ Queen's University Belfast

Breaking things to learn how to protect them. Building security tools, solving CTFs, and documenting the journey.

CompTIA Security+ eJPT TryHackMe Bash Scripting Vulnerability Analysis

Projects

Things I've built and created

[IDS] Alert: Port scan detected
[IDS] Alert: SQLi attempt blocked
[IPS] DROP 192.168.1.105
🎓 University Project • First Class (80%)

Network IDS/IPS Architecture

Designed and analyzed intrusion detection systems for a university project. Investigated real packet captures using Wireshark to identify attack lifecycles — from reconnaissance to data exfiltration. Applied signature-based, anomaly-based, and stateful protocol analysis aligned with NIST IDPS guidance.

Wireshark IDS/IPS NIST Network Security
$ ./evilTwinDetector.sh
Checking duplicate SSIDs...
⚠ Suspicious SSID detected
CafeNet → 2 BSSIDs
🛡️ Security Tool

WiFi Evil Twin Detector

A lightweight Bash-based security tool that detects duplicate SSIDs with different BSSIDs — a common indicator of potential Evil Twin attacks used in rogue access point and man-in-the-middle scenarios.

Bash Linux WiFi Security Network Analysis
View on GitHub
$ ssh iam1@iamlabs.local -p 2220
Level 1: password reuse discovered
Level 6: misconfigured capabilities found
Privilege escalation path identified
🎮 Cybersecurity Lab

IAM Labs

A Linux-based cybersecurity wargame inspired by OverTheWire, designed to teach Identity and Access Management through hands-on challenges. Players move through multiple levels by exploiting misconfigurations related to permissions, groups, capabilities, SSH keys, backups, and privilege escalation.

Linux Bash IAM Privilege Escalation

CTF Writeups

Documenting challenges and solutions

TryHackMe Easy

W1seGuy

Breaking XOR encryption using known plaintext attacks. Learn why repeating-key XOR fails when attackers know part of the message.

Cryptography XOR Python
📖 10 min read
TryHackMe Easy

SimpleCTF

A beginner-friendly walkthrough covering Nmap scanning, Gobuster enumeration, CVE exploitation, and privilege escalation via vim.

Pentesting SQLi PrivEsc
📖 8 min read
TryHackMe Easy

Takeover

Subdomain enumeration using ffuf and SSL certificate inspection to discover hidden services and capture the flag.

Recon ffuf SSL
📖 5 min read
Coming Soon

More Writeups

More TryHackMe rooms, HackTheBox machines, and CTF competition writeups coming soon!

About Me

I'm a cybersecurity student at Queen's University Belfast with a passion for understanding how systems can be broken and how to defend them.

When I'm not studying, I'm solving CTF challenges, building security tools, or contributing to the cybersecurity community. I believe the best way to learn security is by doing.

This site is where I document my journey from security games I've built to challenges I've conquered.

1
Wargame Built
QUB
University
IAM
Focus Area
Curiosity

TryHackMe Progress