About

I am Smish and welcome to my blog! I am a 5th year cybersecurity student finding my footing in the field. The primary purpose of this blog is for me. I want to keep track of my projects and my work, but I also wanted to do write-ups on them so that I can look back as a reference for future work.

I feel that many times when I work on a project, I don't organize my resources. Whenever there is a correlation between a past project and current project, I don't know where to reference. This is going to be the place that I will reference! I will have living documents here that will grow as my knowledge grows.

My interests in cybersecurity tend to be wireless technologies, RFID, and SDRs, specifically locating and exploiting vulnerabilities in those technologies. I also like red teaming cyber operations. My main experience in this was at an internship but I would love to get more.

What the reader can take away from this blog is maybe inspiration. Maybe in my project backlog you see something that you would like to work on. I know sometimes people could get into a slump of not knowing what to work on next, but just peek at the project backlog and maybe it gets your head turning.

I am also by no means an "elite hacker" so the projects can range from simple to challenging. I have my living documents here sorted by category so if you need a quick reference for common Wireshark options or common Linux terminal commands, you can find them here.

My Favorites

  • Language: Python
  • Book: American Kingpin
  • YouTuber: NetworkChuck
  • IDE: VS Code
  • Tool: Wireshark

Projects

Current Work

Brutalist Blog Development

Building this minimalist cybersecurity blog with focus on functionality over form.

Active

SDR Payment System Simulation

Creating a fake payment system with an SDR transceiver to test wireless vulnerabilities.

Planning

Backlog

Custom Bootloader Development

Create a bootloader that displays hello world as a foundation for low-level development.

Queued

RFID Vulnerability Assessment

RFID cloning and vulnerability assessment toolkit for security research.

Research

Wireless Penetration Framework

Comprehensive wireless network penetration testing framework.

Concept

Links

GitHub RepositoryLinkedIn ProfileContact

References

Coming soon - This section will contain my curated list of cybersecurity resources, cheat sheets, and quick references for common tools like Wireshark, Nmap, and various Linux commands.

Hobbies

When I'm not diving deep into cybersecurity, I enjoy playing Tekken 8 competitively, exploring new technologies, and building custom hardware projects. I believe in maintaining a good work-life balance and finding inspiration in diverse interests.