/r/netsecstudents

Photograph via snooOG

A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/

A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/

Wiki contains all the links in one place! Feel free to post in the threads, or message the mods to add more to the lists!

FAQ:

Resources:

Related Subreddits:

/r/netsecstudents

130,354 Subscribers

2

cicflowmeter working python wrapper..

I have been looking for a good tool for converting pcaps/live packets to a csv file.. found out cicflowmeter does that..but omg.. no variant of the tools works for windows.. it works just fine for linx.. but if anyone has a working variation.. any help would be great..

1 Comment
2024/11/28
11:11 UTC

9

New Windows OS PE!

A vulnerability in the ksthunk.sys CKSAutomationThunk::ThunkEnableEventIrp allows a local attacker to exploit an Integer Overflow vulnerability which can be used to gain elevated privileges in the Windows OS: https://ssd-disclosure.com/ssd-advisory-ksthunk-sys-integer-overflow-pe/

0 Comments
2024/11/27
10:07 UTC

0

How do i land in cybersecurity job help me

4 Comments
2024/11/27
06:33 UTC

1

machine learning based NIDS

I'm supposed to make an end-of-year project focused on the conception of a machine learning-based NIDS.

Is it reasonable to implement such a system by integrating Zeek, Snort, and Suricata for their complementary strengths in traffic analysis, signature-based detection, and performance validation, despite the challenges of integration, data handling, and real-time efficiency?

thanks in advance

0 Comments
2024/11/26
18:05 UTC

3

Is XSS possible in URLpath ?

I am testing the efficiency of OWASP CRS with a fuzz based testing tool GotestWAF where it fuzzes the payload by encoding and it places it in different placeholder such as URLpath , URL param, HTMLform and HTMLmultipart form . However I am having a doubt if xss in URLpath is valid .

4 Comments
2024/11/26
08:43 UTC

13

Is specializing in these cybersec domains a good direction to take?

Hey, this is my first time asking here.

A bit about myself: I'm currently a cybersecurity student at a university, not in the US. Things are a bit different in my country, but to give you an idea of my academic background, we can say it's similar to having a bachelor's degree in computer science, and now I'm in a master's cybersecurity program.

Recently, I have been thinking that I should specialize in some cybersecurity domains. The motivation for this thought process is that cybersecurity is a huge multidisciplinary field, and you can't be an expert in everything (network security, IAM, cloud security, Android security, Windows security, etc.).

Before specializing, I believe it's important to have a solid foundation, and I think I do. My background includes:

  • Networking: LAN (equipment, VLAN, subnetting, routing), WAN, dynamic routing, firewalls, network services (DNS, DHCP, NFS, SAMBA, ), OSI model, different TCP/IP protocols... - Programming: HTML/CSS, JS, C/C++, Java, Python, and shell scripting. - A good understanding of Linux, cryptography, among other topics.

Now, the question is: which domains should I focus on? After doing some research https://pauljerimy.com/security-certification-roadmap/ and based on discussions with my professors and based on my personal interests, I have chosen the following areas:

  • OS Security
  • Malware Analysis
  • Digital Forensics

Thus, I plan to delve deeply only into these domains. For example, regarding OS security, my plan is to:

  1. Study the theory of how operating systems work. For this, I have begun reading the famous book "Operating Systems: Three Easy Pieces" You might wonder why I'm revisiting this topic since I have a bachelor's in computer science; the answer is that most courses don't go into too much detail, and I want to refresh my memory.
  2. Explore the design decisions of specific operating systems (for Linux, I plan to read "Linux Kernel Development" by Robert Love; for Windows, I will read "Windows Internals").
  3. Participate in CTFs and challenges that focus on OS security.

The goal of this post is to share my thoughts and to ask the community what they think of this thought process. Any thoughts, tips, or recommendations are very welcome.

EDIT: formatting.

6 Comments
2024/11/23
14:02 UTC

14

Tryhack me vs HTB vs Letsdefend?

I'm looking to really study and learn as much as I can and want to pickup a subscription for black Friday.

Wanted to know if anyone used these platforms and what you think?

Looking to really stuck blue team and SOC type content

8 Comments
2024/11/23
01:30 UTC

1

TyphoonCon Call For Training Is Now Open For Submissions!

🌪️Heads up trainers: TyphoonCon 2025 Call for Training is now open!

Be part of the best all-offensive security conference in Asia!

Submit your training today at: https://typhooncon.com/call-for-training-2025/

0 Comments
2024/11/17
10:50 UTC

5

Recs for Online Bootcamps?

Hello, I'm a 24 yr old high-school grad who has worked mostly in sales and real estate since leaving the serving industry at 18 and not continuing with college courses after COVID shut us down in 2020. I love sales & real estate, but after being commission based for so long I'm looking to transition fields for some more job security. My two main interest in life have always been finance and tech, and I have a father in IT so I feel as though the transition would fit. Ideally I'm looking for

-Online course that can be done at own pace to potentially finish quicker, or at most roughly 20 weeks

-Hands-On learning experience with experienced and helpful instructors

-Job networking & job lead gen would be awesome

-Direct training for one or more of the industry standard certifications, as well as a voucher for said exam and certification within pricing

-Good brand recognition

-Real world applicable knowledge

-Hopefully enough curriculum to get a decent salary job right out the gate without direct further bootcamps or education

-For financing ideally I don't want it more than like 13-15k and would need there to be financing options. (added bonus if they have scholarship opportunities)

Thank Youuuuuuuuu all help and insight is greatly appreciated.

14 Comments
2024/11/17
06:51 UTC

2

WinRM Access Issue: Unable to Use Valid Credentials for Domain Users on Target Machine

I've been working on a pentesting exercise and recently managed to obtain a user's hash with GetUserSPNs.py and cracked it with john. After validating the credentials with GetADUsers.py against administrator.htb, I was able to confirm that the credentials for olivia and ethan are indeed correct.

Here's a summary of what I've done and the issue I'm facing:

  • Used GetUserSPNs.py to request a hash for the user olivia, cracked it, and verified it alongside ethan's credentials using GetADUsers.py -all.
  • WinRM access works perfectly with olivia, but I can't connect via WinRM with ethan's credentials, even though the credentials are confirmed to be correct.
  • When I log in as olivia via WinRM, I can see only three accounts on the machine: olivia, emily, and administrator. However, ethan's credentials should, in theory, allow me to connect.

My question is: Why might ethan’s credentials fail with WinRM access even though they are valid, and what else can I try to troubleshoot this?

Additional Info:

  • OS: Target machine is Windows Server 2019.
  • WinRM is configured correctly since it works with olivia.
  • I’ve already attempted using different Impacket tools and CrackMapExec with ethan, but they don’t return any unusual errors.

Any insights on why I might be facing this issue or suggestions on additional checks or configurations I could try would be greatly appreciated!

3 Comments
2024/11/14
14:26 UTC

4

The test results by GoTestWaf on Modsecurity web application firewall ( integrated with latest CRS ) is very average.

Hello ! I am beginner working on a project to evaluate the efficiency of the latest OWASP CRS integrated with modsecurity and using DVWA as test application . To my surprise the average score is around 55 when tested by GoTestWAF on all paranoia levels . (GoTestWAF is an open source tool by wallarm which fuzzes payload with encoders and placeholders and produces a csv file and a html report file on the details of bypass) What does it indicate ? Does it indicate the WAF doesn’t provide enough protection and I should conclude with my project about the statistical results like XSS had more bypass and specific encoding like base64 and placeholders faced more bypasses ? Or Should I tweak/add rules according to the bypasses ? I am honesty confused on how to take next step for my project .

Thanks !

2 Comments
2024/11/14
12:07 UTC

21

I wrote my first security tool!

For the last 1.5 months I've been working on a blind sqli brute forcer. The code could be a little cleaner, but it works, and its pretty darn fast to boot! I know sqlmap is one of the most reliable tools that pentesters use but i needed a project and this seemed like it was going to be within my skill set. I haven't written python, let alone worked on a project, since college and I'm very pleased with myself for actually fleshing this out and getting it to a useable state. I learned so much through the process! Please consider checking it out and giving me any feedback you have. It would really help me out!

The repo is here:

https://github.com/c3llkn1ght/BlindBrute

5 Comments
2024/11/13
18:40 UTC

5

CRTP vs CRTE. which one to build up my knowledge?

I passed OSCP.
do you think I m ready to start CRTE based on OSCP AD section?
is it better to start with CRTP?

thank you

3 Comments
2024/11/13
15:15 UTC

3

EC Council C|ASE .Net

Hi guys,

Does anyone have any idea about the course CASE.Net provided by EC Council.

1 Comment
2024/11/13
05:26 UTC

2

Open-source SIEM Data-lake

Hi all,

I am a intern that is in his final year of his bachelor Cyber Security. I am tasked with looking for a SIEM solution to make the SIEM functionality future-proofed for the next five to 10 years? as a thesis. and i have to make a top 3 of SIEM that can be used for this. I already have 2 decided these are: Wazuh and ELK. I am still struggling in finding a third one. Got any suggestions or any advice how i should work on this?

edit: there is not really a criteria that i got from the company that i have my intership at. i need to research a top 3 open-sourse SIEM solution that can work as a Data-lake solution with the current SIEM that is splunk. the reason why this is wanted is because at the moment splunk only can get 150GB of data a day, but that is not enough thus they want me so search for a solution.

1.1.1. Main question

How does the SOC future-proof SIEM functionality for the next five to 10 years?

1.1.2. Sub-questions

  1. Capacity and technical developments: How can the SIEM solution be expanded to handle the growing amounts of log data over the next 5 to 10 years, and what technological developments can help?
  2. Stakeholder needs: What are the specific requirements and expectations of internal services such as SecOps, Incident Management and external stakeholders within ITS for extending SIEM functionality?
  3. Dependencies and integration: What dependencies exist within the current SIEM infrastructure and external systems that affect the extension, and how will agreements with product owners be integrated?
  4. Privacy and automation: How can SIEM functionality expansion be aligned with applicable privacy regulations (such as AVG), and how can automation (SOAR) contribute to more efficient security incident handling?
6 Comments
2024/11/12
13:16 UTC

5

Advice on Moving Forward in Binary Exploitation

Hi everyone! I'm looking to get serious about binary exploitation and would like some guidance.

I have a background working in C and I am comfortable working in Linux, so I’m familiar with some foundational low-level concepts.

The next step I want to take is learning binary exploitation, things like bof, using nop sleds, rops, ret2libc, mitigations. Do you have any good resources for these (courses, ctf websites for this) that take you from zero to hero? Thank you in advance!

2 Comments
2024/11/09
19:15 UTC

19

How Do You All Stay Motivated for Self-Study? Any Tips or Routines?

Hey everyone,

I’ve been trying to stay consistent with self-study for a certification (or really, any new skill), but I find it tough to keep the motivation up without a set schedule or a class structure. I know some of you must have your routines down pat, so I’m wondering what works for you.

Do you set a specific daily time limit or follow a weekly schedule? Maybe you use certain apps or group study sessions? Would love to hear any tips on what actually keeps you going – especially after a long day of work when all you want to do is chill.

7 Comments
2024/11/08
12:20 UTC

4

Thinkbook or Hp spectre

I am a cybersecurity student and i will either buy a HP spectre x360 14 or a thinkbook with a I9-14900HX. My friend told me hp spectre will overheat and wont last long for my studies but the thinkbookds cpu is worse. Advice needed

15 Comments
2024/11/07
22:12 UTC

5

Exploiting CORS reflected origin when Auth token is set by another domain

Hello netsec students!

I'm trying to wrap my head around not so common CORS exploits. A backend may be misconfigured to reflect the Origin header and allow credentials, but usually, in what I saw anyway, the token is set by another domain. E.g. www.example.com sets an access token with JS after validating cookies, then makes JS requests to backend.example.com with the access token in an Authorization header.

Are there ways to get a victim's browser to send the access token from www.example.com if that domain doesn't implement CORS (only backend.example.com does)?

Or are CORS misconfigurations not at all dangerous in these cases?

Any pointers to other security issues that may enable exploitation in this situation? Even weird ones. The hacktricks page about CORS has many examples, but none that seem to help in this case. Cheers!

0 Comments
2024/11/06
18:44 UTC

2

CRTP after PNPT

After taking the PNPT exam, I'm planning on signing up 30 days on the CRTP course. At the moment, I'm see ads promoting Diwali & Black Friday discount at 20%.

  1. Is 30 days enough?
  2. Once I pay for course, do I have 30 days lab access counting down from the time I pay?
4 Comments
2024/10/31
02:53 UTC

24

Need to know good options for Online Master Degree in "Cybersecurity"

I'm currently working in Network Security domain and have 5+ years of experience. My org reimburse the cost for Master degree (online). I did some research but couldn't come to a conclusion.

Anyone or their friends are actually pursuing an online degree in CybcerSecurity or completed? Which university is good for knowledge and holds some good value?

Thank you.

18 Comments
2024/10/29
17:46 UTC

10

How does one get better at learning how to fuzz things?

Hi, I'd like to get better at fuzzing things I work with and that I'm interested in. I don't want full coverage for an entire binary, but I'd really like to be able to fuzz the interaction that takes place when Outlook executes Chrome with certain arguments when you click on a link in an email. Specific things like this. I have no idea, currently, how to hook into something like this. Would I build a harness of some sort? Any help is appreciated. Fuzzing Windows interactions like this would be where I'd like to start, but I'm willing to crawl before I run.

Thanks!

4 Comments
2024/10/29
06:07 UTC

8

Modern book equivalents

I've got a bunch of computer networking books that I've read, but the problem is, they are all older books, 90's - 2003 or so, meaning that while the knowledge is truthful, it doesn't reflect well on modern networking... Random example from a book I'm reading now, stating that 11Mbps is the most that radio-based 802.11 can send at! Which was true back then, but certainly is not now.

Can you recommend any thick thick books that are up to date with most modern networking technologies, standards, protocols and techniques?

2 Comments
2024/10/28
16:30 UTC

11

I have a week to burn. Give me some study advice!

Per title. I've booked a week out of work, to spend my annual leave, but also to get a bit of studying under my belt!

I'm in an IT role (Project Manager) and have a bit of practice in things like Hack-The-Box, some Python skills... I'm looking to spend the time on something that I can add to my arsenal, to then help pivot towards CompSec/InfoSec in future.

Any suggestions?

8 Comments
2024/10/27
13:04 UTC

6

Multi-Cloud Secure Federation: One-Click Terraform Templates for Cross-Cloud Connectivity

Tired of managing Non-Human Identities (NHIs) like access keys, client IDs/secrets, and service account keys for cross-cloud connectivity? This project eliminates the need for them, making your multi-cloud environment more secure and easier to manage.

With these end-to-end Terraform templates, you can set up secure, cross-cloud connections seamlessly between:

  • AWS ↔ Azure
  • AWS ↔ GCP
  • Azure ↔ GCP

The project also includes demo videos showing how the setup is done end-to-end with just one click.

Check it out on GitHub: https://github.com/clutchsecurity/federator

0 Comments
2024/10/27
06:49 UTC

2

Any benefits in getting an associate degree next to my bachelor in computer science?

Hello,

I'm in my second year of a computer science degree, and I feel like I have a lot of time left after school. I’ve been building my IT company for about a year (which is still in its infancy, to be honest), and recently, it’s been seeing some success. I got my first contract with a big real estate company that wants me to do software engineering, and I’m working on a deal with a second company for similar work. I still have extra time, and I'm really motivated to get the most out of myself. I’d like to explore cybersecurity and deepen my knowledge in that area.

So, I thought about enrolling in an associate degree for cybersecurity next year, aiming to finish both my bachelor’s and associate degrees at the same time. My goal is to become a standout candidate when it comes time to hire me.

As you can probably tell, I’m exploring multiple paths, but I still have time to improve my skills, and I want to do that. I’m also considering a pivot to the military to become a cyber specialist after a few years of service. I’d really appreciate an outsider’s perspective on these thoughts and ideas.

2 Comments
2024/10/26
10:51 UTC

Back To Top