Information Security · Penetration Testing · ThreatSense Solutions

Cybersecurity Portfolio of Belizaire Bassette II

Senior at Syracuse University majoring in Information Management & Technology (Information Security). I build job-ready cybersecurity skills through hands-on labs, reporting, and ethical testing.
Driven to secure the digital world by understanding threats before they strike.

Network Pen TestingWeb App Pen TestingAPI Security TestingBurp Suite · Nmap · NessusReporting & Remediation
Current Focus
Web App & Network Pen Testing
IST 323 · Labs

Recent hands-on work:

About

I’m Belizaire Bassette II — a Syracuse University student and penetration testing intern focused on practical offensive security. My slogan is: Driven to secure the digital world by understanding threats before they strike.

ThreatSense Solutions is my professional brand and portfolio identity used for ethical security research, responsible testing, and clear reporting. This site is primarily a demonstration of how I test, document, and communicate risk.

Highlighted Security Projects

Each project below is based on a guided or semi-guided lab where I worked through the full workflow: from reconnaissance and exploitation to remediation and reporting.

Archangel (TryHackMe) — Full Attack Chain Walkthrough

Boot2Root · Web Exploitation
Lab Scope: Authorized TryHackMe Boot2Root lab demonstrating full-chain web exploitation, post-exploitation, and privilege escalation.

Overview: Compromised a Linux-based target using a structured penetration testing methodology. Identified and exploited a Local File Inclusion (LFI) vulnerability, escalated it to Remote Code Execution (RCE) via log poisoning, established a reverse shell, and chained multiple misconfigurations to achieve full root compromise.

Attack Chain: Reconnaissance → Directory Enumeration → LFI Discovery → LFI-to-RCE → Reverse Shell → Cron Abuse → SUID Binary Analysis → PATH Hijacking.

Key Takeaways: Demonstrates real-world exploit chaining, manual testing discipline, and the ability to translate technical flaws into concrete security impact.

TryHackMe LFI → RCE Burp Suite Linux PrivEsc Cron Abuse PATH Hijacking
View Full Walkthrough (PDF)

Penetration Testing a pfSense Firewall

Network Pen Testing Lab
Lab Scope: Completed for IST 323: Introduction to Information Security. Assessed a Windows-based enterprise network protected by a pfSense firewall, from recon to remediation.

Overview: Reviewed pfSense WAN/LAN rules, identified weaknesses, and executed both guided (white-box) and unguided (black-box) penetration tests. Used Nessus, Nmap, Traceroute, and OpenVAS to map hosts, enumerate services, and analyze CVEs. Hardened firewall policies, reduced attack surface, and rescanned to confirm that changes removed vulnerabilities without breaking legitimate access. Completed a DMZ assessment to evaluate best practices and common mistakes.

Key Takeaways: Practiced the full five-step penetration testing methodology (recon → scanning → vulnerability analysis → exploitation planning → remediation). Strengthened firewall hardening skills, vulnerability triage, and DMZ design analysis while balancing security, usability, and business needs.

pfSense Nmap Nessus OpenVAS DMZ Hardening
View Lab Report (PDF)

Network Vulnerability Assessment (Findings & Fixes)

Kali Linux · Nessus
Lab Scope: Conducted with full authorization to assess system and network security posture using attacker-style tooling.

Overview: Performed comprehensive scans from a Kali Linux environment, enumerating open ports, services, and misconfigurations. Documented critical, high, and medium-risk findings and mapped them to concrete remediation steps such as patching, disabling legacy protocols, and tightening firewall rules.

Key Takeaways: Improved my ability to translate scan output into actionable fixes and communicate risk clearly to technical and non-technical stakeholders through a structured report.

Kali Linux Vulnerability Scanning Reporting
Network Vulnerability Assessment Project (PDF)

DVWA: Brute Force Attack Exploitation Lab

Web App Pen Testing
Lab Scope: Conducted in an isolated Damn Vulnerable Web Application (DVWA) environment to safely simulate brute-force attacks.

Overview: Intercepted HTTP login requests with Burp Suite, extracted POST parameters, and used Hydra to automate credential guessing. Evaluated the impact of weak passwords and lack of rate limiting on authentication endpoints, then documented defenses such as MFA, account lockout policies, and stronger password requirements.

Key Takeaways: Gained practical experience with web attack tooling, authentication weaknesses, and the security controls that can stop brute-force attacks before they escalate.

DVWA Burp Suite Hydra Auth Hardening
DVWA Brute Force Lab Report (PDF)

Ransomware Attack Simulation — Lifecycle of an Attack

Offensive & Defensive
Lab Scope: Performed in a safe, controlled environment for IST 323 to understand ransomware end-to-end from attacker and defender perspectives.

Overview: Simulated the full ransomware lifecycle: built a dropper, delivered it via phishing, executed the payload to encrypt victim files, and then performed recovery using a private key. Explored exploits like EternalBlue and observed host behavior during and after infection.

Key Takeaways: Reinforced the importance of offline backups, timely patch management, email security controls, and a rehearsed incident response plan when dealing with ransomware.

Ransomware Phishing Simulation Incident Response
Ransomware Attack Simulation Report (PDF)

Using Encryption to Enhance Confidentiality & Integrity

Crypto & Key Management
Lab Scope: Completed as part of IST 323 to explore real-world encryption workflows and key management.

Overview: Implemented symmetric and asymmetric encryption using Kleopatra, OpenSSL, WinSCP, and Linux tools (echo, touch, ls, gpg) to encrypt, sign, transfer, and verify data between systems. Demonstrated how encryption and digital signatures secure communication channels.

Key Takeaways: Strengthened understanding of cryptographic principles, public/private key pairs, digital signatures, and hybrid encryption systems that uphold confidentiality, integrity, and authentication.

OpenSSL GPG SFTP · WinSCP
Encryption Lab Project (PDF)

API Penetration Testing — Authorization (BOLA/IDOR) Practice

API Security
Scope: Structured practice validating object-level authorization, token handling, and rate limiting in REST APIs (authorized labs).

Overview: Tested API endpoints for broken object level authorization (BOLA/IDOR), excessive data exposure, and weak access control. Captured request/response evidence, wrote reproduction steps, and documented secure design guidance.

REST BOLA/IDOR JWT/Tokens Rate Limiting
Writeup coming soon

Web Application Testing — OWASP-aligned Methodology (Ongoing)

Web App Pen Testing
Scope: Continuous practice using Burp Suite workflows across authentication, session, access control, and input validation.

Overview: Built repeatable testing checklists and report templates that translate findings into clear remediation steps. This section will include sanitized writeups and vulnerability narratives as they are finalized.

Burp Suite OWASP Auth/Session Access Control
Writeups coming soon

Contact

For internships, full-time roles, collaborations, or authorized assessments: bassette.secure@gmail.com

Ethical note: I only test assets with explicit authorization or within approved programs.