/r/netsecstudents

Photograph via snooOG

A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/

A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/

Wiki contains all the links in one place! Feel free to post in the threads, or message the mods to add more to the lists!

FAQ:

Resources:

Related Subreddits:

/r/netsecstudents

130,018 Subscribers

3

Advice on Moving Forward in Binary Exploitation

Hi everyone! I'm looking to get serious about binary exploitation and would like some guidance.

I have a background working in C and I am comfortable working in Linux, so I’m familiar with some foundational low-level concepts.

The next step I want to take is learning binary exploitation, things like bof, using nop sleds, rops, ret2libc, mitigations. Do you have any good resources for these (courses, ctf websites for this) that take you from zero to hero? Thank you in advance!

1 Comment
2024/11/09
19:15 UTC

4

CIS Ubuntu Linux 22.04 Security Checklist Automation

https://preview.redd.it/4d9kjaqqurzd1.png?width=1920&format=png&auto=webp&s=5d05d7f7188a1420ca77c4c490c7db53a13d5a7d

One the CIS Ubuntu Linux 22.04 Checklist (available here: https://www.cisecurity.org/benchmark/ubuntu\_linux) a bunch of the things in the table of contents say automated, but I'm not sure how to automate them. Is there a script somewhere?

2 Comments
2024/11/09
00:39 UTC

17

How Do You All Stay Motivated for Self-Study? Any Tips or Routines?

Hey everyone,

I’ve been trying to stay consistent with self-study for a certification (or really, any new skill), but I find it tough to keep the motivation up without a set schedule or a class structure. I know some of you must have your routines down pat, so I’m wondering what works for you.

Do you set a specific daily time limit or follow a weekly schedule? Maybe you use certain apps or group study sessions? Would love to hear any tips on what actually keeps you going – especially after a long day of work when all you want to do is chill.

5 Comments
2024/11/08
12:20 UTC

2

Thinkbook or Hp spectre

I am a cybersecurity student and i will either buy a HP spectre x360 14 or a thinkbook with a I9-14900HX. My friend told me hp spectre will overheat and wont last long for my studies but the thinkbookds cpu is worse. Advice needed

14 Comments
2024/11/07
22:12 UTC

4

Exploiting CORS reflected origin when Auth token is set by another domain

Hello netsec students!

I'm trying to wrap my head around not so common CORS exploits. A backend may be misconfigured to reflect the Origin header and allow credentials, but usually, in what I saw anyway, the token is set by another domain. E.g. www.example.com sets an access token with JS after validating cookies, then makes JS requests to backend.example.com with the access token in an Authorization header.

Are there ways to get a victim's browser to send the access token from www.example.com if that domain doesn't implement CORS (only backend.example.com does)?

Or are CORS misconfigurations not at all dangerous in these cases?

Any pointers to other security issues that may enable exploitation in this situation? Even weird ones. The hacktricks page about CORS has many examples, but none that seem to help in this case. Cheers!

0 Comments
2024/11/06
18:44 UTC

2

CRTP after PNPT

After taking the PNPT exam, I'm planning on signing up 30 days on the CRTP course. At the moment, I'm see ads promoting Diwali & Black Friday discount at 20%.

  1. Is 30 days enough?
  2. Once I pay for course, do I have 30 days lab access counting down from the time I pay?
3 Comments
2024/10/31
02:53 UTC

25

Need to know good options for Online Master Degree in "Cybersecurity"

I'm currently working in Network Security domain and have 5+ years of experience. My org reimburse the cost for Master degree (online). I did some research but couldn't come to a conclusion.

Anyone or their friends are actually pursuing an online degree in CybcerSecurity or completed? Which university is good for knowledge and holds some good value?

Thank you.

18 Comments
2024/10/29
17:46 UTC

10

How does one get better at learning how to fuzz things?

Hi, I'd like to get better at fuzzing things I work with and that I'm interested in. I don't want full coverage for an entire binary, but I'd really like to be able to fuzz the interaction that takes place when Outlook executes Chrome with certain arguments when you click on a link in an email. Specific things like this. I have no idea, currently, how to hook into something like this. Would I build a harness of some sort? Any help is appreciated. Fuzzing Windows interactions like this would be where I'd like to start, but I'm willing to crawl before I run.

Thanks!

4 Comments
2024/10/29
06:07 UTC

8

Modern book equivalents

I've got a bunch of computer networking books that I've read, but the problem is, they are all older books, 90's - 2003 or so, meaning that while the knowledge is truthful, it doesn't reflect well on modern networking... Random example from a book I'm reading now, stating that 11Mbps is the most that radio-based 802.11 can send at! Which was true back then, but certainly is not now.

Can you recommend any thick thick books that are up to date with most modern networking technologies, standards, protocols and techniques?

2 Comments
2024/10/28
16:30 UTC

10

I have a week to burn. Give me some study advice!

Per title. I've booked a week out of work, to spend my annual leave, but also to get a bit of studying under my belt!

I'm in an IT role (Project Manager) and have a bit of practice in things like Hack-The-Box, some Python skills... I'm looking to spend the time on something that I can add to my arsenal, to then help pivot towards CompSec/InfoSec in future.

Any suggestions?

8 Comments
2024/10/27
13:04 UTC

3

Multi-Cloud Secure Federation: One-Click Terraform Templates for Cross-Cloud Connectivity

Tired of managing Non-Human Identities (NHIs) like access keys, client IDs/secrets, and service account keys for cross-cloud connectivity? This project eliminates the need for them, making your multi-cloud environment more secure and easier to manage.

With these end-to-end Terraform templates, you can set up secure, cross-cloud connections seamlessly between:

  • AWS ↔ Azure
  • AWS ↔ GCP
  • Azure ↔ GCP

The project also includes demo videos showing how the setup is done end-to-end with just one click.

Check it out on GitHub: https://github.com/clutchsecurity/federator

0 Comments
2024/10/27
06:49 UTC

2

Any benefits in getting an associate degree next to my bachelor in computer science?

Hello,

I'm in my second year of a computer science degree, and I feel like I have a lot of time left after school. I’ve been building my IT company for about a year (which is still in its infancy, to be honest), and recently, it’s been seeing some success. I got my first contract with a big real estate company that wants me to do software engineering, and I’m working on a deal with a second company for similar work. I still have extra time, and I'm really motivated to get the most out of myself. I’d like to explore cybersecurity and deepen my knowledge in that area.

So, I thought about enrolling in an associate degree for cybersecurity next year, aiming to finish both my bachelor’s and associate degrees at the same time. My goal is to become a standout candidate when it comes time to hire me.

As you can probably tell, I’m exploring multiple paths, but I still have time to improve my skills, and I want to do that. I’m also considering a pivot to the military to become a cyber specialist after a few years of service. I’d really appreciate an outsider’s perspective on these thoughts and ideas.

2 Comments
2024/10/26
10:51 UTC

3

NICE by NIST - complete catalogue of TKS statements set up by NIST

NICE- framework by NIST SP 800-181r1. Paper informs that TKS statements and examples are provided in NICE Framework Resource Center - chapter 3.1 last paragraph.

No success on finding those the location pointed out. Instead a link to NICE Framework Online found which leads Center visitors to space with categories of work roles. Higher number of work roles each category. One can follow link of chosen work role to see T-, K- and S-Statements assigned to role under inspection.

Any idea how to get a view of whole catalogue of TKS-statements to get a feeling rough number of entries catalogue? Any idea where to find promised examples?

0 Comments
2024/10/25
12:05 UTC

7

App Sec Engineer Intern Preparation

Currently doing:

GIAC Video Course & Labs Andrew Hoffman’s book on Web App Security Portswigger Web Academy

OWASP Source Code Dojo Pentester lab Code Review

Does this seem like a reasonable way to prepare? If anyone has other resources please let me know! The role is looking for both AppSec and Pentesting knowledge

5 Comments
2024/10/24
02:56 UTC

1

Where to strat learning cyber security

Just started a systems and network degree (?), don't know if it's the right term. But long story short, I want to work with cyber security, but I don't want to spend 2 more years on a cyber security only degree.

I have 5 years to teach my self. I'm looking for free and good information about cyber security and how to strat learning.

I saw the Udemy classes but it's quite expensive for me at this moment.

Any advices on where I should start?

Thanks in advance

7 Comments
2024/10/23
15:36 UTC

3

Looking for Netscout Training

Hey everyone,

I’m a cybersecurity student currently exploring training programs specifically for NETSCOUT. I’ve been searching for something beyond what is offered through NETSCOUT University, but I haven't had much luck.

The only other option I came across was from CyberTraining 365, but after digging into it, it turns out it was likely a scam (mixed reviews and suspicious domain history). I was hoping to find something more reliable or at least a community-approved alternative.

Does anyone here know of any other legit training programs or certification paths for NETSCOUT technologies? Ideally, something accessible and not overly expensive.

Any help would be greatly appreciated! Thanks in advance!

0 Comments
2024/10/21
13:56 UTC

5

Looking for resources on malware and vulnerabilities discussions for my master's thesis

Good day friends. Hope this complies with the rules.

I'm working on my master's thesis. The project somewhat mirrors what DISCOVER did, so an automated cybersecurity warning generator. Right now, I'm looking for new sources to pull the data from. I'd like to use anything relevant to malware/vuln discussion, so tweets, potentially relevant, subreddits, hacker blogs/forums (anything in english, russian or chinese is fair game), any other social media/blog, anything that can anticipate official reports is welcome. Ideally I'd like to find dumps/datasets, but I'm prepared to scrape.

For now, I'm looking into this dataset on tweets and this more general one, as well as the russian and english forums listed on the wikis. I'm having trouble finding more underground sources.

Any suggestion is welcome, and I thank you for your time.

0 Comments
2024/10/21
12:42 UTC

1

Device advice

I just bought a macbook pro with a m3 but most of my friends are telling me that i did wrong and a windows would have been better. Im currently studying cybersecurity and want to know if a macbook pro is good enough or is there going to be problems for me

8 Comments
2024/10/20
20:45 UTC

0

Easy for High IQ people ?

Is Studying for netsec on ur own with online free resources, easy for high iq people ? Like if a person have High IQ is it easy for him to paas.

7 Comments
2024/10/20
06:17 UTC

2

Weird requests on my local node server

I tried this post on r/cybersecurity and didn't get any bytes. Perhaps someone here has an idea.

Hi, I am doing webdev on a macbook air. I have a node server running on port 4000, and suddenly these requests came in, which I was alarmed by. I did not kick these off.

Does anyone know what these are? Is there malware on my local network scanning for goodies?

I have sonic fiber and a netgear nighthawk router, if that is relevant. As far as I know, nothing should be exposed to the outside world (I have not used any advanced settings in nighthawk configuration panel, and when I curl myIP:4000 the request is denied). I'm a bit lost, if there is a better place to post this please advice. Thanks in advance.

The left column is a request UUID that I assign in my node request handler. Second column is timestamp. Third column is the path of the GET request

```

req-fc102b5b | 10/16/2024, 15:47:58 | path: rtsp://192.168.1.2/

req-d6850a37 | 10/16/2024, 15:47:58 | path: /onvif/device_service

req-07a9632f | 10/16/2024, 15:48:09 | path: /

req-f5e94610 | 10/16/2024, 15:48:09 | path: /%24%7B%24%7Benv%3ATEST%3A-j%7D%24%7Benv%3ATEST%3A-n%7D%24%7Benv%3ATEST%3A-d%7Di%3A%24%7B%3A%3A-d%7Dn%24%7Blower%3As%7D%3A%2F%2F192.168.1.1%3A35114%2FRCPyHsACWPDwqMlrSGCRxtyPyNRUyGSK%7D

req-68b914e6 | 10/16/2024, 15:48:19 | path: /

```

1 Comment
2024/10/19
05:25 UTC

3

HTTP Request Smuggling

I am trying to complete the HTTP request smuggling module on the PortSwigger academy, but I am struggling to understand why my initial solution isn't working. In the "HTTP request smuggling, basic TE.CL vulnerability" lab I know that the front-end server is processing the Transfer-Encoding header, while the back-end server is processing the Content-Length header. The goal is to trick the back-end server in making an invalid "GPOST" request. I tried crafting the following request, which gets me very close to the goal, but I can't figure out the last step. Here is my request:

POST / HTTP/1.1
Host: <lab-id>web.security-academy.net
Content-Length: 2
Transfer-Encoding: chunked

1
G
0

My thought is that the front-end server processes the whole request, including the "1 G 0" as body, and forwards the request to the back-end server. Then, the back-end server should consider "1" as the only byte of the first request, only to interpret G0 as the second request, which causes the invalid "G0POST" request. I just can't get how can I make it ignore the 0, which is vital for the front-end server to correctly process the request

1 Comment
2024/10/18
12:33 UTC

3

SDET/QA to PenTesting

So I finished the Google Cybersecurity Certification. I sort of ran through it rather quickly (as I have 12 years experience in QA and work as an Automation Architect/SDET now) I basically did the test at the end of each module to see if any of the information was "already known". Turns out the vast majority of the stuff I already knew just through experience, but I was still able to learn some terms/etc... I didn't know about (Anything I didn't know I read/studied the relevant sections).

That being said i'm not really sure where to go next. I'm sort of just learning a lot of this to gain some experience in it because I think Ethical Hacking/Red team is interesting and maybe a career for me in the future but if not it's still good experience to maybe apply to my current job.

I've read a lot and watched a lot of youtube videos on career advice and honestly they are sorta all over the place. This one: https://www.youtube.com/watch?v=8K7iAJ9BNl0 made the most sense (Not sure if this guy is legit, but it made sense to me).

I feel like Security+ (or Network+?) is probably a next goal, but also doing hackthebox modules for practice. I do think the eJPT cert makes sense just from a learning standpoint too (What sort of pre-req would be good to tackle the eJPT? Sec+ or more? or is just their training fine?

I've also heard of things like CEH and stuff but i've heard those certs are kinda "meh". I'm not sure what other certs would be relevant. Pen+ etc?

I think ultimately my goal would be to pass the OSCP and maybe eventually move my career over. I feel like I might at least have a leg up having a C.S. degree and working in a sort of IT field for the past 12 years? So I at least have some background maybe?

3 Comments
2024/10/17
14:51 UTC

1

Favorite OS for Laptop

I’m a student studying for my MS in CyS. My work’s scholarship program is giving me $1500 to buy a laptop for school and paying for a good chunk of my classes.

I’ve always used windows OS for my main computer and ran a VM for kali/centOS/ubuntu depending on what I was trying to do. I’ve never personally used a mac for longer than 10-15 mins.

One teacher in a previous class (Data Structures) recommended getting a Mac. Class was heavily coding based for those who havent taken it.

Should I get a macbook pro/air (even if its just for familiarity with the OS) or keep doing what i’ve been doing?

Edit/Note: this laptop will almost exclusively be used for school/random hacking experiments. All gaming is done on my home PC so don’t factor that into the equation.

16 Comments
2024/10/17
10:49 UTC

1

Security+ android practice tests

I have to get Security+ certified for my work. I have a ton of experience but lack confidence. I have already made it though the training material. I really need some time in practice tests and would like to do them on my phone. There are a ton on the app store but no easy way to tell whats crap and what's worth it. Does anyone have an app they have used and liked?

3 Comments
2024/10/15
20:24 UTC

4

Can I get a job without a degree?

Question, im a marine, Mos Data administration but work also as Helpdesk I want to get my certifications like Computer networking, SEC+, etc. Can I Get a good paying job when I get out? (I really don’t want to get a degree I want to focus in all the certs I can. ) Any suggestions or comments? I’m 19 and having a little breakdown about life lol.

15 Comments
2024/10/15
03:59 UTC

Back To Top