Rukshana Alikhan

// Cybersecurity and GRC professional with hands-on experience in governance, risk, compliance, security operations, and practical security projects across technical and business-facing environments.

Building secure systems through governance, risk, and compliance. Combining hands-on security projects with real-world experience in protecting data, systems, and organisations.

CompTIA Security+ eJPT TryHackMe NIST CSF GRC Bash Scripting Vulnerability Analysis Risk & Compliance

Projects

Things I've built and created

[IDS] Alert: Port scan detected
[IDS] Alert: SQLi attempt blocked
[IPS] DROP 192.168.1.105
๐ŸŽ“ University Project โ€ข First Class (80%)

Network IDS/IPS Architecture

Designed and analyzed intrusion detection systems for a university project. Investigated real packet captures using Wireshark to identify attack lifecycles โ€” from reconnaissance to data exfiltration. Applied signature-based, anomaly-based, and stateful protocol analysis aligned with NIST IDPS guidance.

Wireshark IDS/IPS NIST Network Security
$ ./evilTwinDetector.sh
Checking duplicate SSIDs...
โš  Suspicious SSID detected
CafeNet โ†’ 2 BSSIDs
๐Ÿ›ก๏ธ Security Tool

WiFi Evil Twin Detector

A lightweight Bash-based security tool that detects duplicate SSIDs with different BSSIDs โ€” a common indicator of potential Evil Twin attacks used in rogue access point and man-in-the-middle scenarios.

Bash Linux WiFi Security Network Analysis
View on GitHub
$ ssh iam1@iamlabs.local -p 2220
Level 1: password reuse discovered
Level 6: misconfigured capabilities found
Privilege escalation path identified
๐ŸŽฎ Cybersecurity Lab

IAM Labs

A Linux-based cybersecurity wargame inspired by OverTheWire, designed to teach Identity and Access Management through hands-on challenges. Players move through multiple levels by exploiting misconfigurations related to permissions, groups, capabilities, SSH keys, backups, and privilege escalation.

Linux Bash IAM Privilege Escalation

Security Writeups

Documenting challenges and solutions

TryHackMe Easy

W1seGuy

Breaking XOR encryption using known plaintext attacks. Learn why repeating-key XOR fails when attackers know part of the message.

Cryptography XOR Python
๐Ÿ“– 10 min read โ†’
TryHackMe Easy

SimpleCTF

A beginner-friendly walkthrough covering Nmap scanning, Gobuster enumeration, CVE exploitation, and privilege escalation via vim.

Pentesting SQLi PrivEsc
๐Ÿ“– 8 min read โ†’
TryHackMe Easy

Takeover

Subdomain enumeration using ffuf and SSL certificate inspection to discover hidden services and capture the flag.

Recon ffuf SSL
๐Ÿ“– 5 min read โ†’
Coming Soon

More Writeups

More TryHackMe rooms, HackTheBox machines, and CTF competition writeups coming soon!

About Me

I'm a cybersecurity and GRC professional currently pursuing an MSc in Applied Cyber Security at Queenโ€™s University Belfast, with prior hands-on experience across governance, risk, compliance, and security operations.

My background includes supporting ISO 27001-aligned initiatives, Microsoft Purview DLP, audit readiness, incident analysis, and stakeholder reporting across multi-regional environments.

I enjoy combining technical security knowledge with business risk thinking through practical projects, security tooling, writeups, and hands-on labs.

3
Years' Experience
10
Regional Markets Supported
500+
Users Covered by DLP
QUB
MSc Applied Cyber Security

TryHackMe Progress