/r/netsecstudents
A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.
Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/
A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.
Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/
Wiki contains all the links in one place! Feel free to post in the threads, or message the mods to add more to the lists!
FAQ:
Resources:
Related Subreddits:
/r/netsecstudents
Hey did anyone took the course. Is it good for a beginner RE, Malware development and exploit Development. I will take his courses as a leverage for RE courses which I'm currently in P.OST2 also looking for good course which will give you the exploit development basics. Books take a long time for me to read and fully grasp it! Kinda auditory and visual learner here.
Hey everyone! đź‘˝
I'm currently working on a research project about software security practices as part of my Master's program in Norway. My aim is to gain insights into the factors influencing the adoption of security measures in software development and I hope to gather insights from different countries, industry sectors and other demographics. Your participation in the survey would be incredibly valuable to me.
The survey is completely anonymous and will only be used for academic purposes. Whether you're a seasoned software developer or just starting out, I'd love to hear from you and learn about your perspectives.
đź”— Here's the link to the survey: https://nettskjema.no/a/411842
⏱️ It should only take about 5 - 8 minutes of your time.
Your input will be greatly appreciated! đź’™
Hello, can y'all help me for a class by completing this survey? It's entirely anonymous. https://forms.gle/oXKStqjYfgf19Zyh8
Hello
Find below some case studies I have been trying to wrap my head around for my intro to cyber security class… any help would be appreciated…
Summary of Recent Cybersecurity Incidents
Vehicle System Manipulation: The attacker exploited vulnerabilities in the infotainment system of a 2022 Subaru Outback, using the protagonist’s personal information to alter display settings and enable real-time location tracking. Additionally, the car’s radio was locked to a specific channel, and the navigation map functionality was disabled. This sophisticated manipulation was achieved through network penetration and software techniques.
Email and Airbnb Account Access: Utilizing limited personal information, the attacker conducted phishing attacks and exploited password recovery options to gain unauthorized access to the protagonist’s email and Airbnb accounts, further compromising personal and sensitive information.
Selective Device WiFi Disruption: The antagonist manipulated network settings to disrupt WiFi connectivity specifically for TVs, while other devices remained connected. Additionally, at every residence the protagonist has lived, the internet cables were physically cut, and internet providers reported that nothing could be done to resolve the issue. Upon searching for alternative networks, the protagonist found several WiFi networks named in a derogatory manner referencing her.
Hey everyone,
I'm trying to get a better understanding of the CVEProject/cvelistV5 repository on GitHub: https://github.com/CVEProject/cvelistV5. Could anyone explain how it operates behind the scenes? Specifically, I'm curious about who is responsible for publishing and updating CVEs, and whether it provides an API that allows fetching the latest CVEs published every 24 hours.
I've already managed to get the latest CVEs with a simple Python script using the deltaLog.json file
in the repo, but I'm wondering if there's a more streamlined API available. I prefer not using the NVD API because the CVE list provides more detailed information about product names, versions, etc.
Thanks for your help!
I've heard mixed things about the CEH as a SOC analyst certification. personally, I'm trying to level up my blue team skills and not just chase certs.
Does anyone have recommendations on which SOC analyst certification or training could really make a difference in boosting my skills and maybe even landing some SOC job offers?
I have heard about hands-on SOC analyst certifications like CCD from cyberdefenders, BTL, and some others, but I wasn't sure what would be a great start for me now that I finally have some free time on my hands.
I'm studying for an associate's degree in cybersecurity and I'm interested in fields like embedded security, reverse engineering, and security research. I understand that these fields require a strong knowledge of programming/computers on top of years of experience.
My problem is that I am not self-motivated at all when it comes to programming. I can study for certifications like A+ and CCNA because the info needed for those exams is already in books and websites with labs. For programming, I'd have to sit down, read the documentation, watch videos, and ask the d*ckheads on StackOverflow questions. I bought Python Crash Course by Eric Matthes, but I can't bring myself to read it.
I know that if I'm going to specialize in any one of the fields above, then I'm going to have to be disciplined enough to study them.
How can I change this about myself?
Hi everyone!
I'm currently working on a project titled "Implementation of a Vulnerability Management Solution." I write a Python script to extract CVEs and filter them based on specific products, then saving the data in CSV format. Additionally, I've set up Elasticsearch and Kibana on my machine.
I'm considering using the Eland API to integrate my script with Elasticsearch. The goal is to leverage Elasticsearch for analyzing data, and for product comparison and filtering... Are there any alternative approaches or enhancements you could suggest?
Also, I'm fairly new to Elasticsearch and would appreciate any advice on how to enhance this project or implement new features.
Thanks in advance for your help!
I am currently a fourth-semester student majoring in Business Informatics, which essentially combines computer science with business studies. However, I have a strong interest in the field of cyber security and aspire to pursue a master's degree in that area. Yet, I'm concerned that having a bachelor's degree in Business Informatics might pose challenges in securing a job in cyber security. Therefore, I'm contemplating switching my major to pure Computer Science. I'm torn because I feel that Business Informatics offers a broader spectrum of knowledge, but my passion lies in cyber security.
Additionally, I live in Europe where a bachelor's degree typically requires 180 credits. Would this be sufficient to pursue a master's degree in cyber security in the USA? I appreciate any insights or advice on this matter.
I think me trying to learn exploitation is wrong? Im trying to learn reverse engineering first then go into exploit development which then lead me to some resources that clicked on my head like exploit dev is easier before reverse engineering. am I right? is it better to get some grip in exploit dev before even going into reverse engineering. please only security researchers and ppl with xp in the field answer in comments.
by the way i dont have an engineer bg. currently
Hello,
I manage over 1000 virtual machines (VMs), and I'm concerned about blocking harmful traffic that could lead to network abuse, like port scans and torrents, from these VMs. Since the VMs are operated by individuals, there's a risk of them getting infected. I'm searching for a solution to safeguard against this type of traffic. I've heard about integrating Wazuh and Suricata, but I'm uncertain if that's the best approach. I'd appreciate your insights on this matter.
Regards,
Anyone aware of any good online resources to learn about the status-quo in the telecommunications networks in general, and then more specifically by country? For example, although not limited to them, I would like to study about the tech stack in countries like Turkey, Greece, Serbia, Croatia, Egypt, etc.
On your team do you guys have people that specialize certain skills or strengths? Or is there just a knowledge and performance standard you guys strive for on top of keeping up with what’s new?
Also in the physical aspect do you guys have someone who has an Electrical engineering or technician background that helps fab stuff for that.
Just wondering because of the rise of all of the open source hardware now and development boards getting really small.
l
Long story short, my original plan was to major in Bio and then get into dental school, now im at the end of my freshman year and realized im not as interested in science and the medical field as I thought I was. After a lot of research on the career trajectory and all the options available in the field, I decided I want to major in cybersecurity, but as someone with absolutely no coding, programming, or IT/cyber experience at all, I dont know if its a good idea. Just wanted a word of advice on if its advisable to make the switch with little to no knowledge at all about the field.
Im looking for 3-4 highly passionate people in cybersecurity to form a group where we can join CTF and share about experience and knowledge in cybersecurity in general.
If youre interested kindly drop your discord tag/username below.
Thank you and keep hacking
hello everyone has anyone of you enrolled for rana khalils monthly membership and if so do recommend me to enroll or not ?
Do any of you work on the GRC side of things? How do you like it?
Hi everyone,
To provide some context, I am a 32-year-old engineer who worked as a developer for three years. I took a break from work about a year ago due to some personal issues following the COVID crisis.
Although I pursued various studies, I did not obtain any formal degree. Nevertheless, I was employed as an engineer based on my background from a reputable school and demonstrated skills. The job went well, but all I have to show for it is my three-year tenure at this company.
I am interested in transitioning into cybersecurity, particularly focusing on the social engineering aspect. I consider myself quite sociable and would like to leverage this skill in my next job. After spending two years working alone at home during the COVID crisis, I am eager for a change.
I am from France but am open to suggestions from English-speaking countries as well.Do you have any recommendations for training or courses that could be suitable for someone in my situation, especially within France?
I am conducting my own research, but I thought leveraging the Reddit community could provide some valuable insights.
Thanks in advance, and I look forward to your suggestions in the comments!
I'm a newbie into this cybersecurity field and really want to know about where and what people are in and working on. And how they got into and where they end up.
If you are in off.sec. where you see your self end up with? Or after landing a pentesting or related to offence job. What you Target next?
Hi all, I am considering a bachelor's in applied offered by a nearby university. Its a program that condenses junior and senior level classes into a one year program with a built-in internship. I am older and going back to school, so being able to return to the workforce earlier would be huge for me. The downside is that it is a terminal degree, and I would have to take additional classes to qualify for a Masters. At my age, a Master's seems unlikely. Is there a downside to a degree like this vs a CS or MIS degree? My overall goals are to upskill so that I am in demand in a field where six figures is a possibility, hopefully with the ability to work from anywhere. I was planning on pursuing Cyber because the projected double-digit growth hopefully means ageism is minimal, as I am over 50.
Thanks!
I am a newbie into cybersecurity. Just entered into this field ( couple of days ). In this field there are literally numerous of fields to go in. But I think for a guy who just entered, learning, having 0 experience. And offcourse in this field experience matters so to gain experience and with great knowledge of networking etc....can or should go with SOC first and while doing can learn further and dive more into precise filed.
What you guys think about this??
can anyone talk about Slayerlabs? I'm from Asia and they are based on US and Canada so I'm afraid of the usability and latency I might get.
Hello, been enjoying studying alot and looking for input on my learning path. I'm mostly interested in knowledge gained and would like to gradually increase difficulty, having each one build on the previous. Looking for input on how to optimize the order. Any input is appreciated. And maybe others might find this interesting too, therefore I also included some I've already completed.
Currently on step 5.
FUNDAMENTALS:
SOC ANALYST:
PENETRATION TESTER:
BUG BOUNTY HUNTING:
WEB APPLICATION PENTESTING
MOBILE APPLICATION PENTESTING
EXPLOIT DEVELOPMENT
Hi there, I recently saw a video in which someone attempted to scan a website through ZAP, which resulted in an error where the application received a 403 (expecting 2xx). After the scan, however, the website denied access until he switched his vpn location. Just curious, does anyone know why?
Hi,
I'm currently writing my master's thesis on side-channel attacks. I've partnered with a company to examine devices that may require analysis or could serve as interesting targets. Although I have a small list of potential devices, I'm not entirely satisfied with the options I have so far. Therefore, I'm still on the lookout for a device that would truly spark my interest. Does anyone have a suggestion for a device that would be suitable for such an analysis?