Authorized • Professional • Ethical

Resunga Multiple Campus Security Audit

A comprehensive independent security assessment conducted with explicit authorization. This project demonstrates professional cybersecurity research methodology and ethical practices.

Proof of Work Completed

Official Acknowledgement & Results

This formal letter from Resunga Multiple Campus acknowledges the successful completion of the security audit and provides permission to publish the findings. It serves as validation of the professional work conducted.

Work formally acknowledged by institution

Permission granted to publish findings

Openness to future collaboration expressed

Final Letter of Acknowledgement

Official campus letter confirming successful audit completion

View Final Letter

Project Overview

About the Client

Resunga Multiple Campus is a constituent campus of Tribhuvan University located in Tamghas, Gulmi, Nepal. The institution maintains comprehensive digital infrastructure serving students and staff.

About the Auditor

Anuj Panthi is an independent cybersecurity researcher focused on ethical security assessments and helping educational institutions strengthen their digital security posture through authorized testing.

View Portfolio

Audit Results

The assessment identified critical vulnerabilities including exposed API documentation affecting 463 endpoints, SSL misconfigurations, and email security deficiencies. All findings were documented in a professional report.

View Report

Project Documentation

Authorization Letter

Official permission from Resunga Campus authorizing the security audit activities.

View Document

Final Letter (Proof of Work)

Official acknowledgement of completed work and permission to publish findings.

View Final Letter

Security Audit Report

Complete non-sensitive technical report with findings and recommendations.

View Report

Consulting Agreement

Formal agreement outlining the terms of engagement and responsibilities.

View Document

Rules of Engagement

Documented scope, allowed activities, and prohibited actions during testing.

View Document

About the Auditor

Professional background and qualifications of the security researcher.

View Document

Scope of Assessment

In Scope Activities

  • OSINT & Public Information Gathering
  • Subdomain Enumeration
  • SSL/TLS Configuration Analysis
  • Security Header Evaluation
  • Non-Intrusive Vulnerability Scanning
  • Email Security Protocol Checks
  • Technology Stack Fingerprinting

Out of Scope Activities

  • Exploitation of Identified Vulnerabilities
  • Backend/Database Access Attempts
  • Password Cracking or Brute-Force Attacks
  • DDoS or Stress Testing
  • Social Engineering
  • Payload Uploads or Malware Testing
  • Any Intrusive Activities