Take a Virtual, Interactive Tour 

Student Work, Cyber Security, Software Engineering

  |  
4 Min Read

Toasty Sec for Powershell

After experiencing the lengthy task of adding incoming, first-year students to a database by hand, Adam Morris took his experience working in the Cyber Warfare Range to improve administrative work.

 

Knowing there was a better way to complete this work, Adam commissioned his friend Kelvin Ashton to create a program script tool kit as their Student Innovation Project (SIP). Thus, Toasty Sec, named from a flying toaster screensaver that coincided with late night hunger, was created as a tool for security/system administrators.

 

Features like adding and deleting users, hashing files and port scanners were created through PowerShell. Improvements via Toasty Sec includes the ability to access the user’s hardware information.

 

A hash is a unique identifier found on every file. If the hash has changed, the file has been modified. When it comes to cyber security, a user wants to know why a file has been modified. This is where Toasty Sec comes in. This tool kit gives the user the ability to scan the entire disk in a few minutes and hash everything found within the file.

 

UAT-blog-toastyPort scanners are another important part of cyber security. Ports connect to everything on a computer. Your device may experience issues if an unwanted port is open. To keep your device secure, Toasty Sec catches and identifies which ports are open. Toasty Sec even detects SQL injections, the most common type of web-based attack.

 

Both students are graduating with a BS in Network Security and Technology Forensics, and Adam is also studying Network Engineering. Kelvin states, “It’s one project that we based around all of our degrees.”

 

Before their SIP, neither UAT student knew how to use PowerShell. After taking a scripting class to bring their understanding of basic programming structure up to par, they learned that the true challenge came with learning the different programming languages. Kelvin figured out how to transform one language to another through its methodologies by using object-oriented programming. This was the game changer for their SIP.

 

Learn more about UAT’s Cyber Security degrees.

 

Comment

Cyber Lessons from the FBI during Cyber Security Awareness Month

UAT hosted FBI Agents to discuss Cyber Security careers and pathways.
Picture of Robert Walker Robert Walker 4 Min Read

Cyber Ninjas: Building Community and Tackling Real-World Cyber Challenges

At University of Advancing Technology (UAT), Cyber Security isn’t just about textbooks and theory—it’s about collaboration, competition, and applying skills in real-world scenarios. That’s where the ...
Picture of Katy Toerner Katy Toerner 4 Min Read

Cyber Security Awareness Month - UAT Tech Tangents Podcast

At University of Advancing Technology (UAT), Cyber Security Awareness month is a time where students, staff and the community gather together to share tips on making the world a better place.
Picture of Robert Walker Robert Walker 4 Min Read