CW03 Weekly Digest

Table of Contents

To be precise, this is the collection of the materials that I’ve learned during 3 weeks, not only one. I was a bit lazy to create this summary. Feels like a small vacation :)

TryHackMe

  • Currently, I continue with learning the Jr Penetration Tester path. Just for fun. Things which I’ve passed so far (I can’t say that I’ve learned because I don’t think that I manage to do this without guidance). These topics I’d probably learn in the future and create separate articles:
    • SSRF
    • XSS
    • LFI
    • SQL Injection
  • Burp
  • Right now I’m continuing to learn active reconnaissance. I already have an article for this. But probably I’ll write the second part - I’ve gathered a lot of information about Nmap.

CCNA

CCNA learning approach

  1. Course Free CCNA with flashcards and labs
  2. Labs from Odom Wendell on certSkills
  3. Official CCNA guide

Books:

  1. Computer Networking: Top Down Approach
  2. Computer Networks: A system approach

Deadline: March 29 Goal: Connect Cisco certification knowledge with development knowledge

This would be my personal network achievement. So I really do want to finish this.

Current Progress

  • Day 7 of the course
  • Networking the top-down approach: finished 1st chapter

Reverse Engineering

Typical tasks

  1. Rewrite local variable
  2. Return to other function (with or without params)

Good course https://github.com/RPISEC/MBE
Other courses https://github.com/JeremyBlackthorne/RPISEC-Courses

The Strategy

  1. Get in touch with CryproCat videos - like a good intro. I don’t have to understand everything here right now
  2. Course https://github.com/RPISEC/MBE
  3. Collect questions
  4. If the question concerns assembly - check Arch1001
  5. Question about memory or bin - check binary analysis or computer systems
  6. Check tools and examples from KPI slides
  7. Read binary analysis

Books from the course

Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson • ISBN 978-1593271442 • The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley et al • ISBN 978-0470080238

Communications

Found the link with resources for social engineering. It seems if I’ll search that books I’ll find the ruler of effective communication. I almost prepared an article with this. Really excited.