Hi, I'm Logan Weaver, a motivated cybersecurity student at the University of Texas at San Antonio with hands-on experience in programming, scripting, and system and network security. Experienced in packet analysis, network administration and Linux systems. Passionate about making the internet a safer place.
> Education:
University of Texas at San Antonio
B.B.A Cybersecurity Junior
Currently pursuing CompTIA SEC+ and Network+ certifications
Presidents list 4.0 GPA (Spring 2025)
Clubs — On Campus
Computer Security Association
Cyber Jedis.
> Experience:
IS 3413 — Telecommunications and Networking
Used Packet Tracer to simulate real world networking scenarios
Used how to use Wireshark to track different network protocols and IP addresses across a network
Learned how to find and understand DNS records using both Windows and Linux Terminal commands
IS 3033 — Operating Systems Security
Learned how to set up an AWS server running Ubuntu for a honeypot
Learned in depth Linux terminal commands and how to SSH
Learned how to automate tasks with Ansible and YAML along with how to make a cybersecurity playbook
CS 2053 & CS 1083 — Programming
Learned how to program using many different languages including Java, Python, Javascript, and C+
> Projects:
Network Analysis Project: This project involved a deep-dive analysis of live network traffic to establish a security baseline and identify protocol vulnerabilities. Using Wireshark and Npcap, I captured and analyzed over 1.3 million packets over a 4.5-hour session. The analysis focused on the mechanics of the TCP three-way handshake and the critical security differences between plaintext (HTTP/ARP) and encrypted (HTTPS/TLS) communications. This work demonstrates proficiency in packet-level forensics and a strong understanding of how unencrypted data exposure impacts network security.
Password Cracking Project: In this project, I performed a hands-on assessment of authentication security by simulating various password-cracking attacks against Linux and Windows systems. Utilizing Johnny (John the Ripper) and Ophcrack, I demonstrated how standard hashing algorithms—specifically those securing the /etc/shadow and SAM files—can be compromised in minutes using dictionary attacks and rainbow tables