Notes
"An investment in knowledge pays the best interest." - Benjamin Franklin
Binary Exploitation Fundamentals
Basic concepts and techniques for binary exploitation
Binary Exploitation Deep Analysis
Journey into low-level system manipulation
Stepic
Isolated information, regarding image steganography
Disk Imaging
a bit-for-bit copy of a storage device
Caesar Cipher
One of the simplest and most widely known encryption technique.
Image Encryption
Locking an image is just fascinating
Password Complexity Checker
Locking an image is just fascinating
Cross Site Request Forgery(XSS)
A web exploitation that utilizes cookies of target website to forge requests.
AI & Cybersecurity(Internship)
Introduction to azure services and creating labs
Keylogger
records (logs) the keys struck on a keyboard
Network Packet Analyzer
A packet sniffer intercepts and logs network traffic
Introduction to Reverse Engineering
Analyze and Modify the behaviour of a program
ARM
A privilege access to the hardware
Server Side Template Injection(SSTI)
user input is improperly embedded in a server-side template
Metasploit
Computer security testing tool
Operating Systems
A Computer System that acts as an intermediary between hardware and Software Application.
Server Message Block(SMB)
is a communication protocol
OWASP Top 10 Vulnerabilities(2021)
OWASP stands for the Open Web Application Security Project.
Symmetric & Asymmetric Encryption
Understanding symmetric and asymmetric is crucial for cryptography challenges and real world security
Broad-View of Cryptography
The whole picture of cryptography in CTF challenges
Redis
Redis is a key-value database.
Active Directory Attack Path Enumeration
process of automatically analyzing an active directory environment to find every possible chain of misconfigurations
Active Directory
A directory service for Windows network environments.
Web Requests
HTTP (Hypertext Transfer Protocol) specifies a collection of request methods to specify what action is to be performed on a particular resource.
Javascript Deobfuscation
Code deobfuscation is an important skill to learn if we want to be skilled in code analysis and reverse engineering.
Android
Android is a mobile operating system created for touchscreen devices like phones and tablets.
Security Operations Center (SOC)
investigate, monitor, prevent, and respond to threats in the cyber realm 24/7 or around the clock
Command & Control (C2)
mechanisms used to communicate with and control compromised systems (often called “implants” or “bots”) within a target environment.
Linux Fundamentals
A fundamental pillar in cybersecurity, renowned for its robustness, flexibility, and open-source nature.
Python 3
A high-level programming language; used for scripting and automating stuff.
Setting Up
establishing a well-structured testing infrastructure.
Intro to Assembly
a low-level programming language that uses human-readable mnemonics to represent a computer's machine code instructions.
Intro to Networking
Practice of connecting computers and other devices to share data and resources.