Publication Date


Document Type


First Advisor

Leon, James

Degree Name

B.S. (Bachelor of Science)

Legacy Department

Department of Computer Science


In this day and age, cybersecurity is becoming more and more crucial for all technology with internet capabilities. The idea of strangers being able to learn your most secret information and share it with others is very scary. I believe that more people should be able to have access to knowledge and tools in order to better protect their data and technologies, especially at schools. Learning subjects becomes a lot easier when students have an actual environment to practice in, and this project aims to be a hands-on learning environment for students and others interested in security. For my senior capstone project, I designed and set up a standalone ‘target’ security Virtual Machine. The purpose of this VM is for students such as myself to learn and practice hands-on security penetration and defense techniques, in order to have a greater understanding of cybersecurity. I created VMs such as a 'tools' machine with Kali Linux installed, Ubuntu installed on the target machine, and used Oracle VirtualBox to run the VMs. Within the machines, I used XAMPP, MySQL with PHP and HTML, nmap, dirb, and steghide. Those using these machines would learn about types of exploits such as SQL Injection and steganography, as well as a little bit about networking ports and web servers. I hope that this tool will be of great use to those looking to get into the cybersecurity field, especially those who don’t have many resources available to them.

Anjur Vidya 2019.pdf (104 kB)
Anjur Vidya 2019.pdf (104.2Kb)

capstone.doc (41 kB)
Title Page and Written Description and Methodology (41.5Kb)

Anjur Honors Capstone Proposal.pdf (78 kB)
Anjur Honors Capstone Proposal.pdf (78.45Kb)

Anjur Honors Capstone Proposal.docx (18 kB)
Capstone Proposal (18.28Kb)




Northern Illinois University

Rights Statement

In Copyright

Rights Statement 2

NIU theses are protected by copyright. They may be viewed from Huskie Commons for any purpose, but reproduction or distribution in any format is prohibited without the written permission of the authors.

Media Type