ACTIVE

Applying for jobs. Get in touch, now!

Hi! I'm a junior Cyber Security & Digital Forensics graduate from Bristol UWE.

And i'm actively seeking job opportunities!

blur image

Cyber Passion

As a Cyber Security graduate, I have a profound passion for safeguarding digital environments and protecting organisations from threats.

Academic Journey

During my academic journey, I immersed myself in Cyber Security and Digital Forensics, gaining valuable knowledge along the way.

Strategic Goals

I created and implemented customised security strategies using cutting-edge technologies, aligning with organisational goals and priorities.

Keeping up to Date

I keep up to date with current industry trends, and enjoy attending meetups whenever I can.

image

A little bit about me.

Music has always held a special place in my heart. Writing music allow me to express myself and connect with others on a deeper level. Music is a constant source of joy and creativity in my life.

I find delight in exploring k-pop choreography. It's a wonderful way to stay active while letting my creativity flow!

One of my favourite places to be in the world is in the ocean. I love to swim, and I get a sense of calm and serenity that recharges my spirit.

Baking is another passion that brings me happiness. The joy of sharing homemade goodies with my husband is simply priceless.

Lastly, I love exploring different corners of the world and immersing myself in diverse cultures, taste new cuisines, creating lasting memories. The experiences gained from my journeys enrich my perspective and broaden my horizons.

Photo of Aya Abbes
blur image

Some of the work i've done

Throughout University, I've gained extensive knowledge in my field, empowering me with a strong foundation to excel. I'm well-prepared to tackle complex challenges and deliver impactful solutions.

PintOS System Calls & Exploits

I collaborated with others on PintOS, developing system calls and implementing countermeasures for enhanced security. I then exploited the system call to grant the user root access.

Using Python, I analysed large datasets to support informed security decision-making, creating a portfolio of Jupyter Notebooks showcasing security data analytics techniques.

In SQL Plus and Oracle, I designed a relational database for a restaurant franchise, gaining practical skills in data modeling, application development, query optimization, and exploring NoSQL alternatives like MongoDB.


  case SYS_WRITE: {
    if (DEBUG) printf("SYSTEM CALL: Write is being executed");

    assert_valid_pointer(ptr + 1);
    assert_valid_pointer(ptr + 2);
    assert_valid_pointer(ptr + 3);

    int fd = *((int*)ptr + 1);
    char* buffer = (void*)(*((int*)ptr + 2));
    unsigned size = *((unsigned*)ptr + 3);

    // Vulnerable code here!
    // inner_buffer is a fixed size buffer on the stack of size 64 bytes
    // Therefore, by inputting an input buffer of size >64, the excess bytes will overwrite the other values on the stack
    // This will eventually get to the return address, where we can exploit ROP to jump to shellcode defined elsewhere
    char inner_buffer[64];

    // // Countermeasure here!
    // // Don't use 'strcpy' as its NOT safe. The fn does not perform boundary checking on destination buffer
    // int i;
    // while (buffer[i] != '') {
    //   inner_buffer[i] = buffer[i];
    //   i++;
    // }
    strcpy(inner_buffer, buffer);

    // check if writting to STDOUT
    if (fd == 1) {
      putbuf(inner_buffer, size);
      f->eax = size;
      return;
    }
  }
blur image

Security Standards & Pentesting.

I was fortunate to have studied a diverse range of modules that covered a wide spectrum of topics within my field, providing me with a comprehensive understanding and making me well-rounded in my expertise.

ISO27001 standard ISMS

Proposed and implemented a comprehensive ISO27001 standard ISMS for Nuffield Health, addressing real-world security issues through in-depth risk analysis and treatment plans.

Penetration Testing

Conducted Penetration Testing tasks on bugcrowd, leveraging Wireshark for network traffic analysis and securing vulnerable systems.

Let's get in contact!

If you have any questions, inquiries, or would like to discuss potential opportunities, please feel free to reach out to me using the contact details below. I look forward to hearing from you!

blur image