/r/netsecstudents
A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.
Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/
A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.
Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/
Wiki contains all the links in one place! Feel free to post in the threads, or message the mods to add more to the lists!
FAQ:
Resources:
Related Subreddits:
/r/netsecstudents
I have been looking for a good tool for converting pcaps/live packets to a csv file.. found out cicflowmeter does that..but omg.. no variant of the tools works for windows.. it works just fine for linx.. but if anyone has a working variation.. any help would be great..
A vulnerability in the ksthunk.sys CKSAutomationThunk::ThunkEnableEventIrp allows a local attacker to exploit an Integer Overflow vulnerability which can be used to gain elevated privileges in the Windows OS: https://ssd-disclosure.com/ssd-advisory-ksthunk-sys-integer-overflow-pe/
I'm supposed to make an end-of-year project focused on the conception of a machine learning-based NIDS.
Is it reasonable to implement such a system by integrating Zeek, Snort, and Suricata for their complementary strengths in traffic analysis, signature-based detection, and performance validation, despite the challenges of integration, data handling, and real-time efficiency?
thanks in advance
I am testing the efficiency of OWASP CRS with a fuzz based testing tool GotestWAF where it fuzzes the payload by encoding and it places it in different placeholder such as URLpath , URL param, HTMLform and HTMLmultipart form . However I am having a doubt if xss in URLpath is valid .
Hey, this is my first time asking here.
A bit about myself: I'm currently a cybersecurity student at a university, not in the US. Things are a bit different in my country, but to give you an idea of my academic background, we can say it's similar to having a bachelor's degree in computer science, and now I'm in a master's cybersecurity program.
Recently, I have been thinking that I should specialize in some cybersecurity domains. The motivation for this thought process is that cybersecurity is a huge multidisciplinary field, and you can't be an expert in everything (network security, IAM, cloud security, Android security, Windows security, etc.).
Before specializing, I believe it's important to have a solid foundation, and I think I do. My background includes:
Now, the question is: which domains should I focus on? After doing some research https://pauljerimy.com/security-certification-roadmap/ and based on discussions with my professors and based on my personal interests, I have chosen the following areas:
Thus, I plan to delve deeply only into these domains. For example, regarding OS security, my plan is to:
The goal of this post is to share my thoughts and to ask the community what they think of this thought process. Any thoughts, tips, or recommendations are very welcome.
EDIT: formatting.
I'm looking to really study and learn as much as I can and want to pickup a subscription for black Friday.
Wanted to know if anyone used these platforms and what you think?
Looking to really stuck blue team and SOC type content
🌪️Heads up trainers: TyphoonCon 2025 Call for Training is now open!
Be part of the best all-offensive security conference in Asia!
Submit your training today at: https://typhooncon.com/call-for-training-2025/
Hello, I'm a 24 yr old high-school grad who has worked mostly in sales and real estate since leaving the serving industry at 18 and not continuing with college courses after COVID shut us down in 2020. I love sales & real estate, but after being commission based for so long I'm looking to transition fields for some more job security. My two main interest in life have always been finance and tech, and I have a father in IT so I feel as though the transition would fit. Ideally I'm looking for
-Online course that can be done at own pace to potentially finish quicker, or at most roughly 20 weeks
-Hands-On learning experience with experienced and helpful instructors
-Job networking & job lead gen would be awesome
-Direct training for one or more of the industry standard certifications, as well as a voucher for said exam and certification within pricing
-Good brand recognition
-Real world applicable knowledge
-Hopefully enough curriculum to get a decent salary job right out the gate without direct further bootcamps or education
-For financing ideally I don't want it more than like 13-15k and would need there to be financing options. (added bonus if they have scholarship opportunities)
Thank Youuuuuuuuu all help and insight is greatly appreciated.
I've been working on a pentesting exercise and recently managed to obtain a user's hash with GetUserSPNs.py
and cracked it with john
. After validating the credentials with GetADUsers.py
against administrator.htb
, I was able to confirm that the credentials for olivia
and ethan
are indeed correct.
Here's a summary of what I've done and the issue I'm facing:
GetUserSPNs.py
to request a hash for the user olivia
, cracked it, and verified it alongside ethan
's credentials using GetADUsers.py
-all
.olivia
, but I can't connect via WinRM with ethan
's credentials, even though the credentials are confirmed to be correct.olivia
via WinRM, I can see only three accounts on the machine: olivia
, emily
, and administrator
. However, ethan
's credentials should, in theory, allow me to connect.My question is: Why might ethan
’s credentials fail with WinRM access even though they are valid, and what else can I try to troubleshoot this?
Additional Info:
olivia
.ethan
, but they don’t return any unusual errors.Any insights on why I might be facing this issue or suggestions on additional checks or configurations I could try would be greatly appreciated!
Hello ! I am beginner working on a project to evaluate the efficiency of the latest OWASP CRS integrated with modsecurity and using DVWA as test application . To my surprise the average score is around 55 when tested by GoTestWAF on all paranoia levels . (GoTestWAF is an open source tool by wallarm which fuzzes payload with encoders and placeholders and produces a csv file and a html report file on the details of bypass) What does it indicate ? Does it indicate the WAF doesn’t provide enough protection and I should conclude with my project about the statistical results like XSS had more bypass and specific encoding like base64 and placeholders faced more bypasses ? Or Should I tweak/add rules according to the bypasses ? I am honesty confused on how to take next step for my project .
Thanks !
For the last 1.5 months I've been working on a blind sqli brute forcer. The code could be a little cleaner, but it works, and its pretty darn fast to boot! I know sqlmap is one of the most reliable tools that pentesters use but i needed a project and this seemed like it was going to be within my skill set. I haven't written python, let alone worked on a project, since college and I'm very pleased with myself for actually fleshing this out and getting it to a useable state. I learned so much through the process! Please consider checking it out and giving me any feedback you have. It would really help me out!
The repo is here:
I passed OSCP.
do you think I m ready to start CRTE based on OSCP AD section?
is it better to start with CRTP?
thank you
Hi guys,
Does anyone have any idea about the course CASE.Net provided by EC Council.
Hi all,
I am a intern that is in his final year of his bachelor Cyber Security. I am tasked with looking for a SIEM solution to make the SIEM functionality future-proofed for the next five to 10 years? as a thesis. and i have to make a top 3 of SIEM that can be used for this. I already have 2 decided these are: Wazuh and ELK. I am still struggling in finding a third one. Got any suggestions or any advice how i should work on this?
edit: there is not really a criteria that i got from the company that i have my intership at. i need to research a top 3 open-sourse SIEM solution that can work as a Data-lake solution with the current SIEM that is splunk. the reason why this is wanted is because at the moment splunk only can get 150GB of data a day, but that is not enough thus they want me so search for a solution.
How does the SOC future-proof SIEM functionality for the next five to 10 years?
Hi everyone! I'm looking to get serious about binary exploitation and would like some guidance.
I have a background working in C and I am comfortable working in Linux, so I’m familiar with some foundational low-level concepts.
The next step I want to take is learning binary exploitation, things like bof, using nop sleds, rops, ret2libc, mitigations. Do you have any good resources for these (courses, ctf websites for this) that take you from zero to hero? Thank you in advance!
Hey everyone,
I’ve been trying to stay consistent with self-study for a certification (or really, any new skill), but I find it tough to keep the motivation up without a set schedule or a class structure. I know some of you must have your routines down pat, so I’m wondering what works for you.
Do you set a specific daily time limit or follow a weekly schedule? Maybe you use certain apps or group study sessions? Would love to hear any tips on what actually keeps you going – especially after a long day of work when all you want to do is chill.
I am a cybersecurity student and i will either buy a HP spectre x360 14 or a thinkbook with a I9-14900HX. My friend told me hp spectre will overheat and wont last long for my studies but the thinkbookds cpu is worse. Advice needed
Hello netsec students!
I'm trying to wrap my head around not so common CORS exploits. A backend may be misconfigured to reflect the Origin header and allow credentials, but usually, in what I saw anyway, the token is set by another domain. E.g. www.example.com sets an access token with JS after validating cookies, then makes JS requests to backend.example.com with the access token in an Authorization header.
Are there ways to get a victim's browser to send the access token from www.example.com if that domain doesn't implement CORS (only backend.example.com does)?
Or are CORS misconfigurations not at all dangerous in these cases?
Any pointers to other security issues that may enable exploitation in this situation? Even weird ones. The hacktricks page about CORS has many examples, but none that seem to help in this case. Cheers!
After taking the PNPT exam, I'm planning on signing up 30 days on the CRTP course. At the moment, I'm see ads promoting Diwali & Black Friday discount at 20%.
I'm currently working in Network Security domain and have 5+ years of experience. My org reimburse the cost for Master degree (online). I did some research but couldn't come to a conclusion.
Anyone or their friends are actually pursuing an online degree in CybcerSecurity or completed? Which university is good for knowledge and holds some good value?
Thank you.
Hi, I'd like to get better at fuzzing things I work with and that I'm interested in. I don't want full coverage for an entire binary, but I'd really like to be able to fuzz the interaction that takes place when Outlook executes Chrome with certain arguments when you click on a link in an email. Specific things like this. I have no idea, currently, how to hook into something like this. Would I build a harness of some sort? Any help is appreciated. Fuzzing Windows interactions like this would be where I'd like to start, but I'm willing to crawl before I run.
Thanks!
I've got a bunch of computer networking books that I've read, but the problem is, they are all older books, 90's - 2003 or so, meaning that while the knowledge is truthful, it doesn't reflect well on modern networking... Random example from a book I'm reading now, stating that 11Mbps is the most that radio-based 802.11 can send at! Which was true back then, but certainly is not now.
Can you recommend any thick thick books that are up to date with most modern networking technologies, standards, protocols and techniques?
Per title. I've booked a week out of work, to spend my annual leave, but also to get a bit of studying under my belt!
I'm in an IT role (Project Manager) and have a bit of practice in things like Hack-The-Box, some Python skills... I'm looking to spend the time on something that I can add to my arsenal, to then help pivot towards CompSec/InfoSec in future.
Any suggestions?
Tired of managing Non-Human Identities (NHIs) like access keys, client IDs/secrets, and service account keys for cross-cloud connectivity? This project eliminates the need for them, making your multi-cloud environment more secure and easier to manage.
With these end-to-end Terraform templates, you can set up secure, cross-cloud connections seamlessly between:
The project also includes demo videos showing how the setup is done end-to-end with just one click.
Check it out on GitHub: https://github.com/clutchsecurity/federator
Hello,
I'm in my second year of a computer science degree, and I feel like I have a lot of time left after school. I’ve been building my IT company for about a year (which is still in its infancy, to be honest), and recently, it’s been seeing some success. I got my first contract with a big real estate company that wants me to do software engineering, and I’m working on a deal with a second company for similar work. I still have extra time, and I'm really motivated to get the most out of myself. I’d like to explore cybersecurity and deepen my knowledge in that area.
So, I thought about enrolling in an associate degree for cybersecurity next year, aiming to finish both my bachelor’s and associate degrees at the same time. My goal is to become a standout candidate when it comes time to hire me.
As you can probably tell, I’m exploring multiple paths, but I still have time to improve my skills, and I want to do that. I’m also considering a pivot to the military to become a cyber specialist after a few years of service. I’d really appreciate an outsider’s perspective on these thoughts and ideas.