/r/netsecstudents

Photograph via snooOG

A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/

A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.

Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/

Wiki contains all the links in one place! Feel free to post in the threads, or message the mods to add more to the lists!

FAQ:

Resources:

Related Subreddits:

/r/netsecstudents

125,871 Subscribers

12

Learning websec pentesting and remediations: Good books?

I'm an IT grad. I want to learn it. I've collected few resources like

  • owasp

  • rana khalil

  • web application security handbook

  • comptia sec+, comptia pentest+ books

  • zaid sabih's udemy course on ethical hacking/pentesting.

But probably because I'm still not yet ready for learning websec, I find it tough to do exercises like SQL injection on dvwa and burp suite in kali linux.

I'd love any guidance very much.

4 Comments
2024/07/13
13:58 UTC

11

How to get into cyber risk analyst/engineering roles?

I'm a Computer Information Systems major at my university and I'm interested in third-party cyber risk engineering and cyber risk compliance type roles. I'm actively looking for internships in those fields and I'm wondering what I should add to my resume to be a competitive candidate.

Should I get certs like Security+ and AWS Cloud Practicioner or something else?

3 Comments
2024/07/07
14:10 UTC

1

Ethical hacking: where to begin?

I am a student with some theoretical and practical knowledge in computer science, programming, and networking. I am interested in delving into cybersecurity to become an ethical hacker. However, I am unsure where to begin. Should I start with a theoretical study of networking fundamentals? Or should I dive directly into learning about hacking techniques? I would appreciate some guidance on approaching these topics effectively and where to begin my journey. Could you recommend resources, books or roadmaps for someone at my level?

8 Comments
2024/07/05
17:42 UTC

18

Studying netsec

Hellow everybody Im new to IT and i want to study to became a cybersec speciallist what do you recommendo to study ?

A friend of me told me that i should study this to start in there:

Comptia A+

Comptia Network+

Comptia Security+

Comptia Linux+
PD: I dont have the money or the time to go to an university, whit theese its okey to just start ?

Thanks

8 Comments
2024/07/05
14:45 UTC

3

Research advice

Hi, doing my masters research on cyber/network security but everytime I present a research topic to my professor it just never gets approved, mostly because we're looking into topics of federated learning and metaverse (and honestly I do not want to do it because I'm not proficient in ML or high level coding) I mostly wanted to do the research based on cryptography or encryption ideas and since my lab is network based the professor wanted something related to network security. I've went through so many research papers but i still haven't found what to research on and the time I have now is very less.

So please if anyone can suggest some in-depth research direction topics on cryptography or encryption or network security (based on zero trust security if possible) it will be a huge help.

I want to work as a cybersecurity or cyber crime analyst but unfortunately my lab or professor is not proficient in it so any topic that is closest to it will be appreciated. (His lab is on network security) Depression is also kicking my ass so I would definitely want to finish this masters as soon as I can do I can solely focus on learning cybersecurity.

Thank you

2 Comments
2024/07/03
02:11 UTC

5

UniXSS - Generate UniCode Normalized Payloads for XSS Attacks

Hi everyone,
I just created a small repository containing a python script, named UniXSS, which aims to help generate Unicode Normalized payloads to perform XSS attacks with ease.

As of today, I have noticed that most payloads falling under this category are shown inside tables and images, which make it harder and slower to exploit.

Notice: consider that it might not follow the best coding principles or optimization strategies. It is just a script which effectively responds to a personal need, which I think might be a common one.

Enjoy!

Repository:
https://github.com/alessio-romano/UniXSS

0 Comments
2024/07/02
10:12 UTC

0

“Cybersecurity Crossroads: Help Needed for Career Advancement!”

Hey everyone, just wrapped up my undergraduate degree in cyber security! 🎓 Now I'm facing a dilemma and could really use some advice. I'm currently working as a SOC analyst in a small company, but it's not providing the learning and growth I had hoped for. Should I pursue a master's degree through distance learning, or would you recommend focusing on specific courses instead? What's been your experience, and any suggestions you might have would be super helpful! Thanks a bunch! 🌟

2 Comments
2024/06/29
17:43 UTC

12

Tony Robinson - Building Virtual Machine Labs, 2nd Edition :: Suricata script fails

Hello, I am working through Tony's 2nd edition. All has gone extremely smoothly to this point. All tasks and checks complete and matching the screenshots and values described in the book.

And then ...... I reach Chapter 17 and the installation of Suricata onto the IPS. I am using VMWare Workstation Pro, v15.5. All VM's are running without issue and I can SSH into the machines using the key based authentication via mRemote. I have SSH'ed into the IPS and then sudo to root.

When I run the autosuricata-deb-AVATAR.sh it fails at line 191, pip3 install --upgrade pyelftools pyyaml suricata-update &>> $logfile

The error is 'This environment is externally managed'

The recommended solution is to use pipx vs pip3, which I installed pipx and then commented out and updated the script to pipx. RUN ---- same error, same location.

The install log references system-wide packages, non-Debian packages and venv, but then qualifies that overriding the command to try the standalone install risks breaking the IPS VM.

I'm not a programmer, just know enough to review code, write some brutally simply flat code and don't quite know how to troubleshoot this issue.

I am running on a Windows 10 host, dual XEON and 128GB RAM. Shouldn't be a hardware or host system issue. Also don't believe it is a VMWare hypervisor issue. Not sure if the problem is the IPS Ubuntu VM or the issues with the script syntax or changes in called tools which may make them unreachable.

0 Comments
2024/06/25
17:29 UTC

5

With LFI how to find the path to the process code if it's being run with uvicorn using /proc technique?

I'm a bug bounty hunter, and I specialize more on XSS and leaks in JS files. But recently I wanted to challenge myself by finding more manual, and business logic bugs. After a few weeks on this private program I FINALLY found a few stored XSS and an LFI. The API emails you your files (note taking service). However, the file name (docx) "mynotes.docx) as an example can be changed to

"../../../../../../etc/passwd". I wanted to escalate this and hopefully get a better payout so I downloaded this file "../../../../../proc/self/cmdline" and I got back something like this

/usr/bin/python3 /usr/local/bin/uvicorn server:app --env-file /opt/REDACTED-citation/environment/prod.env --uds /tmp/nti-citation_3.sockz

After downloading the environment variable path (because it looked juicy), the data was not at all interesting and there was a comment made by a developer saying to migrate all the hard-coded keys into the file instead. I tried to find the server code itself so I could show some impact (I've tested a few bugs on this specific company and they usually disregard the report if there is no impact shown). Moreover, I did research and people say to escalate your findings.

After reading a few articles they said to find the child process by doing this

/proc/self/stat

I got this outcome:

50 (uvicorn) S 37 50 37 0 -1 4194560 39488 92 0 0 12103 615 0 0 20 0 3 0 13733 564260864 37304 18446744073709551615 4337664 7053653 140722596844176 0 0 0 0 16781312 16386 0 0 0 17 0 0 0 0 0 0 9407920 9698072 37625856 140722596846704 140722596846836 140722596846836 140722596847585 0

They said to download the PID after the "S", so I did /proc/37/cmdline and got back /usr/bin/python3... not very useful. Moreover, I've tried getting the current working directory of the process by using

/proc/self/cwd -> but this returns a false error from the API which means it cannot find this file or it is not accessible (assuming it's not able to find it since all other proc files have been found).

0 Comments
2024/06/23
19:07 UTC

2

CR 1.7 point 1 (62443-4-2) not redundant?

Regarding OT: isn’t the component requirement 1.7 in its point (1) - not the RE - redundant if to consider CR 1.5 a) j) ?

ISA/IEC 62443-4-2

0 Comments
2024/06/23
18:08 UTC

0

Random Verification Text

I’m trying to know where this number 33959 is linked to. I went to recover it in my recently deleted text messages but I can’t seem to find it. (the messages don’t appear) Does anybody know what website that code is used for?

2 Comments
2024/06/23
15:39 UTC

29

XSSy: An XSS lab site

I've been working on a cross-site scripting lab site that I think people here will find useful. It includes:

  • 10 easy labs for learning XSS. To solve each lab you need to learn and use a basic XSS technique. Most of the labs have video solutions.
  • 15+ moderate labs for learning more advanced techniques from Unicode XSS to CSP Bypass. Again, most of the labs have video solutions.
  • 5 hard labs that will teach most seasoned pen testers a thing or two.
  • Payloads can be submitted to a headless browser for verification, and there is a leader board of the top solvers, with a guy from r/xss way out in the lead.
  • You can create your own labs. This may be useful if you have an unusual scenario, where you're unsure if it's exploitable, so you can crowdsource solutions.

I hope some people will find the learning valuable. If you have any feedback, feel free to DM me.

13 Comments
2024/06/23
15:00 UTC

32

How to keep up with the latest in cybersecurity

How do you stay updated with the latest trends, tools and threats?

21 Comments
2024/06/22
17:13 UTC

2

My experience setting up a secure Remote Desktop

I recently created a secure remote desktop environment for a project and wanted to share my experience. I used a combination of RDP and a multi-path VPN to maximise security. You can only connect to RDP with the IP of your private VPN config. Does anyone else here work with secure remote desktops? What has been your experience?

2 Comments
2024/06/20
19:02 UTC

12

Tips for Network Capturing

Hey guys and gals,

Quick question, I’m wondering what would be best for my needs right now. Is there something I could buy or download for my network to capture all network traffic then if an incident occurs, I can go back and see said traffic? For example, says someone has infiltrated the network and exported data out the network. I would want to export said traffic, import it into wireshark and analyze it. Right now if we don’t see the traffic as it’s happening we won’t see the “actual traffic” if that makes sense.

13 Comments
2024/06/19
20:08 UTC

3

AAS in Cybersecurity, 5 years IT experience, close to 10 certs. Is this enough?

Hello, I'm here asking for a friend.

Currently, he's pursuing an AAS in Cybersecurity. This is a "career-ready" degree, not a transfer degree (minimal gen ed, mostly CS courses). He also has 5 years of IT experience. He started as a Tier I Analyst, climbed up to Associate Operations Manager, and finally, Service Manager. He's no longer working in IT, but the experience is all within the last 8 years.

He also has a lot of certs. I don't remember the ones he got years ago (some are from Microsoft), but he has at least 6 or 7. He will also have Security+, Network+, and either A+ or Linux+ as part of his AAS degree (he's about 1/4 of the way through the program with a high GPA).

Will these qualifications be enough for him to transition right into a cybersecurity career or will he have to start over as tech support? Or would it be wise to do a normal, transfer-ready AS and continue to a BS?

Thanks for any input you have!

16 Comments
2024/06/17
21:01 UTC

9

Help Understanding API Key Generation from a Code

Hello everyone,

I'm seeking help understanding how an API key is generated from program code. Here's the situation:

  • Context: I've been using Charles Proxy to monitor network traffic from a program I'm working with. When I open a specific link within the program, it attempts to send an HTTPS request to an API endpoint.
  • Challenge: The HTTPS request includes an API key, but this key doesn't appear in Charles Proxy logs, indicating it's generated locally by the program.
  • Examples:
    • Input String 1: nARrpu0vmtr12mij7XzINy1_HVmhVwJz2udIeqiSVug
      • Generated API Key: 793fba56-c2bf-449b-b8a3-c7389aaa9880
    • Input String 2: Ne8aLYXWglDzvbt2LnzrmTlNerxHPtiTf3ddx1PuLpg
      • Generated API Key: 282fe963-b4f3-4757-8d4b-2df6ea43b6a4
  • What I Need Help With:
    • I want to understand how the program generates this API key locally from the code after I interact with the link.
    • The API key format resembles a UUID (e.g., 793fba56-c2bf-449b-b8a3-c7389aaa9880), and I suspect it involves hashing or some other cryptographic process.

Request:

  • Could someone guide me on how to approach reverse-engineering the API key generation process from the program code?
  • Any tips, tools, or methodologies that could help me uncover the process would be greatly appreciated.

Thank you for your time and assistance!

2 Comments
2024/06/15
23:08 UTC

5

Microsoft Azure Sentinel 101: Dynamically update and change Alert/Incident Severity — based on query results with automation or logic apps for all alerts

0 Comments
2024/06/14
12:18 UTC

9

As stupid as this might sound... how do you retain the information you've learned in school?

Struggling a lot with the technical questions within the interview because I've had a long 8 month gap where I was supposed to find a co op but I've never ended up finding one because the job market is extremely rough in Canada. I want to retain the information I've learned over the last 2 years, because it seriously seems like I'm about to forget it all. How do I retain information, let alone learn new things? This gap has had a big effect on me and not in a good way.

8 Comments
2024/06/13
16:16 UTC

3

how is the routine when working with cyber security?

I don't have any knowledge in IT, but I read that it pays well and you don't have to talk to people (introvert here haha)

I know it's probably stressful, but, honestly, what job isn't stressful this days?

So I want to understand how much stressful can be, how much time of your week you put into the job.

You have to achieve goals (as in the sells field)? It's more autonomous or you can be part of the company?

Also, do I need to have a degree in some technology field or I can start working after doing some courses in the internet (with certificate ofc)?

23 Comments
2024/06/13
14:43 UTC

1

Digital Nomad Visas in the Cybersecurity Industry

r/cybersecurity seems to have removed my post, so maybe this is the place to ask?

I am currently working as a security engineer for a small MSSP in the U.S.

The lease is ending on my rental unit, and I'd like to explore my options abroad. I am relatively young and currently have no wife, children or home keeping me in one spot, and have very little attachment to any of the places I've lived in the U.S. thus far.

I have traveled extensively since the end of covid, and while doing so, have learned about many of the digital nomad visa's that countries are offering to bring highly skilled labor (and tax revenue) into their borders. I have been mainly looking at the Czech Republic.

This idea began as a seed, but has since sprouted into something that I'm highly interested in. So much so that I've spoken to the embassy, the Czech Ministry of Trade, and have consulted with immigration lawyers to better understand the laws and tax implications related to such a move.

My biggest questions would be: is this even allowed within the industry? Would I still be abiding by U.S regulations if accessing client data and infrastructure from within the EU? ( All of our clients are U.S based; I am also a U.S citizen. )

I basically want to get all my facts straight before presenting such an idea to the owner of the company. I'd also be going from full-time back to contractor status and pay taxes quarterly in the Czech Republic. This would provide me access to their national health care and public services as well. So basically, taxes, PTO, and health / dental would be completely off my employers plate.

The time zone is also optimal for me. I have been a night owl my entire life and tend to do my best thinking later in the day. I would also be renting a fully furnished apartment, so I would just be bringing a duffel bag full of clothes and my computers. Anything else I could just purchase there.

Has anybody else presented an idea like this to their company, or had a coworker / employee do something similar? If so, what was the outcome?

2 Comments
2024/06/11
19:19 UTC

0

How to get into CyberSecurity

I am finishing my Master's in Applied IT this September and am currently exploring job opportunities. However, because my degree covered such a broad range of topics, I feel like a jack of all trades but a master of none. I particularly enjoyed the machine learning and network courses during my studies.

I am interested in exploring the field of cybersecurity but was hesitant to take an optional course that required extensive knowledge of x86 architecture. I'm not sure where to start, but I'm considering pursuing an online certificate to gain knowledge and demonstrate my capabilities.

Does anyone have tips or ideas on how to proceed?

10 Comments
2024/06/10
19:06 UTC

Back To Top