Notes

"An investment in knowledge pays the best interest." - Benjamin Franklin

Binary Exploitation Fundamentals

Basic concepts and techniques for binary exploitation

pwn binary-exploitation buffer-overflow

Binary Exploitation Deep Analysis

Journey into low-level system manipulation

pwn binary-exploitation buffer-overflow stack heap assembly

Stepic

Isolated information, regarding image steganography

stepic forensics steganography png image

Disk Imaging

a bit-for-bit copy of a storage device

disk imaging forensics autopsy memory foremost

Caesar Cipher

One of the simplest and most widely known encryption technique.

cryptoGRAPHY encryption encoding decoding decryption shift cipher

Image Encryption

Locking an image is just fascinating

pixels encryption image cryptography decryption

Password Complexity Checker

Locking an image is just fascinating

python encryption programming crypto decryption

Cross Site Request Forgery(XSS)

A web exploitation that utilizes cookies of target website to forge requests.

web csrf iframe cookies requests

AI & Cybersecurity(Internship)

Introduction to azure services and creating labs

datacenters cloud computing labs application security azure

Keylogger

records (logs) the keys struck on a keyboard

security python logging pynput

Network Packet Analyzer

A packet sniffer intercepts and logs network traffic

python networking packets icmp

Introduction to Reverse Engineering

Analyze and Modify the behaviour of a program

c assembly rev ghidra firmware

ARM

A privilege access to the hardware

assembly rev mobile-hacking firmware

Server Side Template Injection(SSTI)

user input is improperly embedded in a server-side template

input web template tplmap

Metasploit

Computer security testing tool

exploits payloads pen-testing automation

Operating Systems

A Computer System that acts as an intermediary between hardware and Software Application.

process cpu memory i/o

Server Message Block(SMB)

is a communication protocol

smb network client-server

OWASP Top 10 Vulnerabilities(2021)

OWASP stands for the Open Web Application Security Project.

web owasp vuln cwe 2021

Symmetric & Asymmetric Encryption

Understanding symmetric and asymmetric is crucial for cryptography challenges and real world security

rsa aes crypto des encryption

Broad-View of Cryptography

The whole picture of cryptography in CTF challenges

ciphers aes crypto hashing morse code base64

Redis

Redis is a key-value database.

redis-cli database

Active Directory Attack Path Enumeration

process of automatically analyzing an active directory environment to find every possible chain of misconfigurations

microsoft AD enumeration

Active Directory

A directory service for Windows network environments.

AD windows microsoft

Web Requests

HTTP (Hypertext Transfer Protocol) specifies a collection of request methods to specify what action is to be performed on a particular resource.

web http internet https crud

Javascript Deobfuscation

Code deobfuscation is an important skill to learn if we want to be skilled in code analysis and reverse engineering.

code-analysis decoding rev javascript

Android

Android is a mobile operating system created for touchscreen devices like phones and tablets.

ARM

Security Operations Center (SOC)

investigate, monitor, prevent, and respond to threats in the cyber realm 24/7 or around the clock

siem logs threat-hunter threat-intelligence reporting ticketing

Command & Control (C2)

mechanisms used to communicate with and control compromised systems (often called “implants” or “bots”) within a target environment.

C2 exploits implants offensive post-exploitation

Linux Fundamentals

A fundamental pillar in cybersecurity, renowned for its robustness, flexibility, and open-source nature.

filesystems hacking-system management networking

Python 3

A high-level programming language; used for scripting and automating stuff.

programming coding python scripting

Setting Up

establishing a well-structured testing infrastructure.

virtualization vpn sandbox

Intro to Assembly

a low-level programming language that uses human-readable mnemonics to represent a computer's machine code instructions.

low-level assembly ARM x86_64

Intro to Networking

Practice of connecting computers and other devices to share data and resources.

ip address ipv4 ipv6 subnetting