ReadMe.txt

Welcome to the documentation for, well, me!

It all started on a rainy day in January of 2000—wait, we don't need to go back that far! I recently finished studying Networking and Cybersecurity at the University of Alaska Fairbanks from my home in Washington state. I'm employed as a Student Assistant Sysadmin with the UAF Geophysical Institute, where I assist the permafrost laboratory by maintaining their research computing infrastructure. I spend much of my free time working in my homelab with whatever systems/technology interest me.

Things I Can Do

I have an avid interest in almost anything tech, as well as a love for the outdoors! Heres some things I've worked with/on in the past

  • Java, Python, C++, HTML, CSS
  • pfSense, Cisco IOS, PAN OS, OpenWRT, Ubiquity Unifi
  • CentOS, Kali, Ubuntu, NEMS, Mint, Debian, Unraid
  • Windows Server 2008-2019, HyperV, Active Directory, IIS
  • ESXi/vCenter, Proxomox, Amazon Web Services, Google Cloud, Docker

A Few Accomplishments

Below are some accomplishments I've achieved in my time as a student.

Building an Extensive Homelab Environment

Over my time studying networking and cybersecurity and my free time as a recent graduate, I have built a large homelab environment. My envvironment includes a full, virtualized Active Directory domain running DNS/DHCP in it's own VLAN and full monitoring with PRTG. I have many dockerized applications running accross multiple servers, some of which run on a kuberenetes cluster based on Portainer. I run many VMs in a proxmox cluster, but have used ESXi and Hyper-V for running VMs in the past. Some of my VMs include a Pterodactyl game server, Security Onion, AWX (upstream/open source Ansible Tower), OpenWRT, and Portainer as mentioned earlier.

I list this as an ongiong accomplishment as a good Homelab is never complete and requires ongoing maintenance and upgrades!

Configured a Cloud Honeypot

Using cloud credits from Google Cloud Platform and the T-Pot project, I configured a web honeypot to gather attack data from the open web. T-Pot is an open source project spearheaded by T-Mobile that runs a large number of smaller honeypots and collects/logs all data into an ELK stack for analysis. At the time of writing, my T-Pot instance has run for just shy of three weeks and has seen well over a million attacks in that time from over a hundred thousand unique IP addresses. In the future I may do a full blog writeup on some of the attacks I've seen.

Collegiate Cyber Defense Competition

As part of the UAF Cyber Security Club I participate in the National Collegiate Cyber Defense Competition. It consists of multiple competitions at the qualifiers, regional and national levels. Though I have never been a part of a national competition, I have participated in one qualifier and two regional events. At regionals, we face a team of highly trained, volunteer professional red-team hackers who attempt to bring down each team's mock-IT infrastructure. As part of the competition we are tasked with defending a misconfigured, poorly assembled, and aging set of virtualized infrastructure, and we're scored based on uptime and how well we complete "injects". This competition is awesome because I'm able to gain real-world, hands-on experience against a real red-team in real-time.

The Dev Bin

During the 2019 Hackathon here at UAF, I was part of a team that created a product we call the PiLet—an Alaskan-rugged smart outlet designed for controlling a car's block heater. We won "Most Alaskan" and we were offered an I-Corps grant from the National Science Foundation!

Contact Me

[email protected]