/r/netsecstudents

Photograph via snooOG

A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/

A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/

Wiki contains all the links in one place! Feel free to post in the threads, or message the mods to add more to the lists!

FAQ:

Resources:

Related Subreddits:

/r/netsecstudents

123,871 Subscribers

1

Looking for Course reccomendation for Exploit Development & Windows api course in Pluralsight by pavel yosifovich.

Hey did anyone took the course. Is it good for a beginner RE, Malware development and exploit Development. I will take his courses as a leverage for RE courses which I'm currently in P.OST2 also looking for good course which will give you the exploit development basics. Books take a long time for me to read and fully grasp it! Kinda auditory and visual learner here.

0 Comments
2024/04/26
09:05 UTC

1

Seeking Insights: Survey on Software Security Practices for Master's Research Project 🚀

Hey everyone! đź‘˝

I'm currently working on a research project about software security practices as part of my Master's program in Norway. My aim is to gain insights into the factors influencing the adoption of security measures in software development and I hope to gather insights from different countries, industry sectors and other demographics. Your participation in the survey would be incredibly valuable to me.

The survey is completely anonymous and will only be used for academic purposes. Whether you're a seasoned software developer or just starting out, I'd love to hear from you and learn about your perspectives.

đź”— Here's the link to the survey: https://nettskjema.no/a/411842

⏱️ It should only take about 5 - 8 minutes of your time.

Your input will be greatly appreciated! đź’™

0 Comments
2024/04/25
13:41 UTC

0

Survey for psychology of cyber security class

Hello, can y'all help me for a class by completing this survey? It's entirely anonymous. https://forms.gle/oXKStqjYfgf19Zyh8

0 Comments
2024/04/25
13:39 UTC

1

Case studies: need help!

Hello

Find below some case studies I have been trying to wrap my head around for my intro to cyber security class… any help would be appreciated…

Summary of Recent Cybersecurity Incidents

  1. Vehicle System Manipulation: The attacker exploited vulnerabilities in the infotainment system of a 2022 Subaru Outback, using the protagonist’s personal information to alter display settings and enable real-time location tracking. Additionally, the car’s radio was locked to a specific channel, and the navigation map functionality was disabled. This sophisticated manipulation was achieved through network penetration and software techniques.

  2. Email and Airbnb Account Access: Utilizing limited personal information, the attacker conducted phishing attacks and exploited password recovery options to gain unauthorized access to the protagonist’s email and Airbnb accounts, further compromising personal and sensitive information.

  3. Selective Device WiFi Disruption: The antagonist manipulated network settings to disrupt WiFi connectivity specifically for TVs, while other devices remained connected. Additionally, at every residence the protagonist has lived, the internet cables were physically cut, and internet providers reported that nothing could be done to resolve the issue. Upon searching for alternative networks, the protagonist found several WiFi networks named in a derogatory manner referencing her.

3 Comments
2024/04/25
04:21 UTC

2

Understanding How CVEProject/cvelistV5 Works

Hey everyone,

I'm trying to get a better understanding of the CVEProject/cvelistV5 repository on GitHub: https://github.com/CVEProject/cvelistV5. Could anyone explain how it operates behind the scenes? Specifically, I'm curious about who is responsible for publishing and updating CVEs, and whether it provides an API that allows fetching the latest CVEs published every 24 hours.

I've already managed to get the latest CVEs with a simple Python script using the deltaLog.json file
in the repo, but I'm wondering if there's a more streamlined API available. I prefer not using the NVD API because the CVE list provides more detailed information about product names, versions, etc.

Thanks for your help!

0 Comments
2024/04/25
02:09 UTC

27

whats a practical SOC analyst certification?

I've heard mixed things about the CEH as a SOC analyst certification. personally, I'm trying to level up my blue team skills and not just chase certs.

Does anyone have recommendations on which SOC analyst certification or training could really make a difference in boosting my skills and maybe even landing some SOC job offers?

I have heard about hands-on SOC analyst certifications like CCD from cyberdefenders, BTL, and some others, but I wasn't sure what would be a great start for me now that I finally have some free time on my hands.

11 Comments
2024/04/24
13:10 UTC

21

I am not a self-starter at all. How can I fix this?

I'm studying for an associate's degree in cybersecurity and I'm interested in fields like embedded security, reverse engineering, and security research. I understand that these fields require a strong knowledge of programming/computers on top of years of experience.

My problem is that I am not self-motivated at all when it comes to programming. I can study for certifications like A+ and CCNA because the info needed for those exams is already in books and websites with labs. For programming, I'd have to sit down, read the documentation, watch videos, and ask the d*ckheads on StackOverflow questions. I bought Python Crash Course by Eric Matthes, but I can't bring myself to read it.

I know that if I'm going to specialize in any one of the fields above, then I'm going to have to be disciplined enough to study them.

How can I change this about myself?

12 Comments
2024/04/21
18:47 UTC

4

Seeking Advice on Implementing a Vulnerability Management Solution Using Elasticsearch

Hi everyone!

I'm currently working on a project titled "Implementation of a Vulnerability Management Solution." I write a Python script to extract CVEs and filter them based on specific products, then saving the data in CSV format. Additionally, I've set up Elasticsearch and Kibana on my machine.

I'm considering using the Eland API to integrate my script with Elasticsearch. The goal is to leverage Elasticsearch for analyzing data, and for product comparison and filtering... Are there any alternative approaches or enhancements you could suggest?

Also, I'm fairly new to Elasticsearch and would appreciate any advice on how to enhance this project or implement new features.

Thanks in advance for your help!

0 Comments
2024/04/21
03:54 UTC

0

Business Informatics vs. Computer Science for Cyber Security

I am currently a fourth-semester student majoring in Business Informatics, which essentially combines computer science with business studies. However, I have a strong interest in the field of cyber security and aspire to pursue a master's degree in that area. Yet, I'm concerned that having a bachelor's degree in Business Informatics might pose challenges in securing a job in cyber security. Therefore, I'm contemplating switching my major to pure Computer Science. I'm torn because I feel that Business Informatics offers a broader spectrum of knowledge, but my passion lies in cyber security.

Additionally, I live in Europe where a bachelor's degree typically requires 180 credits. Would this be sufficient to pursue a master's degree in cyber security in the USA? I appreciate any insights or advice on this matter.

7 Comments
2024/04/20
12:39 UTC

6

re or exploit dev? which one to learn first

I think me trying to learn exploitation is wrong? Im trying to learn reverse engineering first then go into exploit development which then lead me to some resources that clicked on my head like exploit dev is easier before reverse engineering. am I right? is it better to get some grip in exploit dev before even going into reverse engineering. please only security researchers and ppl with xp in the field answer in comments.

by the way i dont have an engineer bg. currently

4 Comments
2024/04/20
06:13 UTC

8

Distributed IPS

Hello,

I manage over 1000 virtual machines (VMs), and I'm concerned about blocking harmful traffic that could lead to network abuse, like port scans and torrents, from these VMs. Since the VMs are operated by individuals, there's a risk of them getting infected. I'm searching for a solution to safeguard against this type of traffic. I've heard about integrating Wazuh and Suricata, but I'm uncertain if that's the best approach. I'd appreciate your insights on this matter.

Regards,

3 Comments
2024/04/19
20:27 UTC

2

Current hardware/software stack in modern telecommunications networks in various counties?

Anyone aware of any good online resources to learn about the status-quo in the telecommunications networks in general, and then more specifically by country? For example, although not limited to them, I would like to study about the tech stack in countries like Turkey, Greece, Serbia, Croatia, Egypt, etc.

1 Comment
2024/04/18
18:45 UTC

12

Question for the red teamers out there

On your team do you guys have people that specialize certain skills or strengths? Or is there just a knowledge and performance standard you guys strive for on top of keeping up with what’s new?

Also in the physical aspect do you guys have someone who has an Electrical engineering or technician background that helps fab stuff for that.

Just wondering because of the rise of all of the open source hardware now and development boards getting really small.

l

6 Comments
2024/04/16
18:34 UTC

0

Switching major from biology to cybersecurity

Long story short, my original plan was to major in Bio and then get into dental school, now im at the end of my freshman year and realized im not as interested in science and the medical field as I thought I was. After a lot of research on the career trajectory and all the options available in the field, I decided I want to major in cybersecurity, but as someone with absolutely no coding, programming, or IT/cyber experience at all, I dont know if its a good idea. Just wanted a word of advice on if its advisable to make the switch with little to no knowledge at all about the field.

25 Comments
2024/04/15
19:07 UTC

0

Looking for 3 - 4 people for CTF/Cybersecurity Group

Im looking for 3-4 highly passionate people in cybersecurity to form a group where we can join CTF and share about experience and knowledge in cybersecurity in general.

If youre interested kindly drop your discord tag/username below.

Thank you and keep hacking

3 Comments
2024/04/15
04:13 UTC

1

reviews/opinions on rana khalils monthly membership as bug hunters?

hello everyone has anyone of you enrolled for rana khalils monthly membership and if so do recommend me to enroll or not ?

2 Comments
2024/04/12
22:18 UTC

5

GRC jobs

Do any of you work on the GRC side of things? How do you like it?

16 Comments
2024/04/12
17:12 UTC

2

Transitioning from Development to Cybersecurity, Focusing on Social Engineering

Hi everyone,

To provide some context, I am a 32-year-old engineer who worked as a developer for three years. I took a break from work about a year ago due to some personal issues following the COVID crisis.

Although I pursued various studies, I did not obtain any formal degree. Nevertheless, I was employed as an engineer based on my background from a reputable school and demonstrated skills. The job went well, but all I have to show for it is my three-year tenure at this company.

I am interested in transitioning into cybersecurity, particularly focusing on the social engineering aspect. I consider myself quite sociable and would like to leverage this skill in my next job. After spending two years working alone at home during the COVID crisis, I am eager for a change.

I am from France but am open to suggestions from English-speaking countries as well.Do you have any recommendations for training or courses that could be suitable for someone in my situation, especially within France?

I am conducting my own research, but I thought leveraging the Reddit community could provide some valuable insights.

Thanks in advance, and I look forward to your suggestions in the comments!

2 Comments
2024/04/12
15:38 UTC

0

Where people landing jobs in Off. Sec. . Watching themselves at the end? Or end up with?

I'm a newbie into this cybersecurity field and really want to know about where and what people are in and working on. And how they got into and where they end up.

If you are in off.sec. where you see your self end up with? Or after landing a pentesting or related to offence job. What you Target next?

1 Comment
2024/04/10
02:56 UTC

3

Feedback on this degree program

Hi all, I am considering a bachelor's in applied offered by a nearby university. Its a program that condenses junior and senior level classes into a one year program with a built-in internship. I am older and going back to school, so being able to return to the workforce earlier would be huge for me. The downside is that it is a terminal degree, and I would have to take additional classes to qualify for a Masters. At my age, a Master's seems unlikely. Is there a downside to a degree like this vs a CS or MIS degree? My overall goals are to upskill so that I am in demand in a field where six figures is a possibility, hopefully with the ability to work from anywhere. I was planning on pursuing Cyber because the projected double-digit growth hopefully means ageism is minimal, as I am over 50.

https://www.utc.edu/engineering-and-computer-science/academic-programs/bs-computer-science-program-overview/bachelor-of-applied-science-information-technology-bas-it

Thanks!

3 Comments
2024/04/09
16:55 UTC

8

SOC is the first job a newbie or without experience guy should take?

I am a newbie into cybersecurity. Just entered into this field ( couple of days ). In this field there are literally numerous of fields to go in. But I think for a guy who just entered, learning, having 0 experience. And offcourse in this field experience matters so to gain experience and with great knowledge of networking etc....can or should go with SOC first and while doing can learn further and dive more into precise filed.

What you guys think about this??

23 Comments
2024/04/09
03:46 UTC

8

Slayerlabs

can anyone talk about Slayerlabs? I'm from Asia and they are based on US and Canada so I'm afraid of the usability and latency I might get.

5 Comments
2024/04/09
02:28 UTC

69

Cybersecurity learning path

Hello, been enjoying studying alot and looking for input on my learning path. I'm mostly interested in knowledge gained and would like to gradually increase difficulty, having each one build on the previous. Looking for input on how to optimize the order. Any input is appreciated. And maybe others might find this interesting too, therefore I also included some I've already completed.

Currently on step 5.

FUNDAMENTALS:

  1. Google Cybersecurity Professional Certificate

  2. Introduction to Cyber Security by THM

  3. Pre Security by THM

  4. Web Fundamentals by THM

  5. Complete Beginner by THM

  6. Information Security Foundations by HTB

SOC ANALYST:

  1. SOC Analyst Learning Path by LetsDefend

  2. Blue Team Level 1 (BTL1) by Security Blue Team

  3. SOC Level 1 by THM

  4. SOC Level 2 by THM

  5. Cyber Defense by THM

  6. SOC Analyst Prerequisities by HTB

  7. SOC Analyst by HTB

  8. CDSA by HTB

PENETRATION TESTER:

  1. eJPT by INE Security

  2. Jr Penetration Tester by THM

  3. Offensive Pentesting by THM

  4. Red Teaming by THM

  5. Penetration Tester by HTB

  6. eCPPT by INE Security

  7. PNPT by TCM Security

  8. CPTS by HTB

  9. OSCP by OffSec

BUG BOUNTY HUNTING:

  1. Bug Bounty Hunter by HTB

  2. CBBH by HTB

WEB APPLICATION PENTESTING

  1. eWPT by INE Security

  2. Senior Web Penetration Tester

  3. CWEE by HTB

MOBILE APPLICATION PENTESTING

  1. Mobile Application Penetration Testing by TCM Security

  2. eMAPT by INE Security

EXPLOIT DEVELOPMENT

  1. OSED by INE Security

  2. OSEE by OffSec

21 Comments
2024/04/07
12:30 UTC

7

Website denying access after owasp zap scan

Hi there, I recently saw a video in which someone attempted to scan a website through ZAP, which resulted in an error where the application received a 403 (expecting 2xx). After the scan, however, the website denied access until he switched his vpn location. Just curious, does anyone know why?

10 Comments
2024/04/06
05:11 UTC

9

Thesis on side channel attacks

Hi,

I'm currently writing my master's thesis on side-channel attacks. I've partnered with a company to examine devices that may require analysis or could serve as interesting targets. Although I have a small list of potential devices, I'm not entirely satisfied with the options I have so far. Therefore, I'm still on the lookout for a device that would truly spark my interest. Does anyone have a suggestion for a device that would be suitable for such an analysis?

7 Comments
2024/04/04
13:10 UTC

Back To Top