|
1 | | -# Information-Security-Tasks |
2 | | -This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions |
| 1 | +--- |
| 2 | +cover: .gitbook/assets/1744 (1).gif |
| 3 | +coverY: 0 |
| 4 | +layout: landing |
| 5 | +--- |
3 | 6 |
|
4 | | -On day to day basis learners struggle for guidance , This repository is aimed to create a training guidance for students and learners with various information security topics |
| 7 | +# ☢️ ../../../../hacking\_methodology |
5 | 8 |
|
6 | | -if you learnt some technique or wish to give the world a task please add it up here , Either it maybe easy or hard it would help someone to |
7 | | -enlighten their knowledge. |
| 9 | +<figure><img src=".gitbook/assets/image (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png" alt=""><figcaption><p><a href="https://swizsecurity.com/">Swiz Security LLC</a></p></figcaption></figure> |
8 | 10 |
|
| 11 | +## Introduction |
9 | 12 |
|
10 | | -<b><h1>PLEASE DONT FORGET TO LOOK AT WEBSITES FOR REFERENCE ,FEEL FREE TO ADD YOUR SITE TO THE CATEGORY</b></h1> |
| 13 | +Welcome all, I hope you enjoy your stay! |
| 14 | + |
| 15 | +_<mark style="color:yellow;">Knowledge should be free, accessible to all, and in one place. The security community permitted me to be able to learn all of this, this is just me giving back</mark>._ |
| 16 | + |
| 17 | +**This is the main place I will be documenting hacking, research, notes, my methodology, and experiences**. In other words, welcome to my world. |
| 18 | + |
| 19 | +**I cover everything from:** |
| 20 | + |
| 21 | +* <mark style="color:red;">Binary Exploitation</mark> |
| 22 | +* <mark style="color:red;">Reverse Engineering</mark> |
| 23 | +* <mark style="color:red;">Malware Development</mark> |
| 24 | +* <mark style="color:red;">Pentesting/Redteaming Methodologies</mark> |
| 25 | +* <mark style="color:red;">Theory</mark> |
| 26 | + |
| 27 | +## Special Thanks |
| 28 | + |
| 29 | +> _**I wanted to give a special thank you to Mr. Eltringham for always believing in me during my college experience. I could not have done it without you. I will forever keep your words of motivation and wisdom in the background with each professional decision I make going forward.**_ |
| 30 | +
|
| 31 | +> "_**You must have confidence in your competence.**_" |
| 32 | +> |
| 33 | +> \~ Professor Russell |
| 34 | +
|
| 35 | +## Motivation |
| 36 | + |
| 37 | +**These notes are an excellent way for me to convey my knowledge, skill set, and a good way to share what I've learned through my experiences. I believe sharing my notes is a great way to give back to others since I would not be where I am without collaboration efforts from others**. |
| 38 | + |
| 39 | +## What am I currently working on? |
| 40 | + |
| 41 | +**Check this out** :smile:**:**  |
| 42 | + |
| 43 | +{% content-ref url="binary-exploitation/automating-ret2libc-got-and-plt-w-pwntools.md" %} |
| 44 | +[automating-ret2libc-got-and-plt-w-pwntools.md](binary-exploitation/automating-ret2libc-got-and-plt-w-pwntools.md) |
| 45 | +{% endcontent-ref %} |
| 46 | + |
| 47 | +{% content-ref url="binary-exploitation/return-oriented-programming-rop/rop-chains-101.md" %} |
| 48 | +[rop-chains-101.md](binary-exploitation/return-oriented-programming-rop/rop-chains-101.md) |
| 49 | +{% endcontent-ref %} |
| 50 | + |
| 51 | +{% content-ref url="binary-exploitation/ret2libc/" %} |
| 52 | +[ret2libc](binary-exploitation/ret2libc/) |
| 53 | +{% endcontent-ref %} |
| 54 | + |
| 55 | +_**Within the last year, I made a switch from **<mark style="color:yellow;">**Pentesting**</mark>** to **<mark style="color:yellow;">**Vulnerability Research**</mark>** and couldn't be happier!**_  |
| 56 | + |
| 57 | +**How would I compare the two?** |
| 58 | + |
| 59 | +> _**I went from attacking computers from the view of a satellite to attacking them from the perspective of looking under an electron microscope.**_ |
| 60 | +
|
| 61 | +**A solid explanation of vulnerability research:**  |
| 62 | + |
| 63 | +> _**"We're the weapon that no one saw coming**_ :wink:_**".**_ |
| 64 | +
|
| 65 | +We analyze software and hardware components for vulnerabilities and develop Proof-of-Concept exploits for them. |
| 66 | + |
| 67 | +<figure><img src=".gitbook/assets/Screenshot 2024-06-26 at 3.35.28 PM.png" alt=""><figcaption></figcaption></figure> |
| 68 | + |
| 69 | +### Projects |
| 70 | + |
| 71 | +<mark style="color:yellow;">As of lately</mark>, I am strengthening my C and Python development skills to become a more competent developer. Want to keep track of my maldev progress -- check out my GitHub repo and my [Malware Development](malware-development/) page in my Gitbook!  |
| 72 | + |
| 73 | +**Here I will be covering a bunch of binary exploitation:** |
| 74 | + |
| 75 | +{% content-ref url="binary-exploitation/binex-methodology-and-notes.md" %} |
| 76 | +[binex-methodology-and-notes.md](binary-exploitation/binex-methodology-and-notes.md) |
| 77 | +{% endcontent-ref %} |
| 78 | + |
| 79 | +{% embed url="https://github.com/0xXyc/binex" %} |
| 80 | + |
| 81 | +**Check out my walkthroughs for the challenges below and let's learn together:** |
| 82 | + |
| 83 | +{% content-ref url="binary-exploitation/return-oriented-programming-rop/" %} |
| 84 | +[return-oriented-programming-rop](binary-exploitation/return-oriented-programming-rop/) |
| 85 | +{% endcontent-ref %} |
| 86 | + |
| 87 | +**Also, be sure to check out my latest pwn challenge writeups from Hack The Box (HTB):** |
| 88 | + |
| 89 | +{% content-ref url="binary-exploitation/htb-pwn-challenges/" %} |
| 90 | +[htb-pwn-challenges](binary-exploitation/htb-pwn-challenges/) |
| 91 | +{% endcontent-ref %} |
| 92 | + |
| 93 | +## Current Industry-Recognized Certifications |
| 94 | + |
| 95 | +### <mark style="color:yellow;">TCM Security Practical Network Penetration Tester (PNPT)</mark> |
| 96 | + |
| 97 | +* A 5-day long assessment where you are tasked with conducting OSINT on a target, breaching a network externally and internally |
| 98 | +* The ultimate goal is to become domain admin |
| 99 | +* Lastly, you must give a 15 minute debrief to the TCM Security team |
| 100 | + |
| 101 | +<figure><img src=".gitbook/assets/image (1) (9) (1).png" alt="" width="200"><figcaption></figcaption></figure> |
| 102 | + |
| 103 | +### <mark style="color:yellow;">Hack The Box's Dante Pro Labs</mark> |
| 104 | + |
| 105 | +* Interactive environment with 27 flags and 14 hosts to compromise |
| 106 | + |
| 107 | +<figure><img src=".gitbook/assets/image (11) (1) (1) (2).png" alt=""><figcaption></figcaption></figure> |
| 108 | + |
| 109 | +### <mark style="color:yellow;">CompTIA Security+</mark> |
| 110 | + |
| 111 | +<figure><img src=".gitbook/assets/image (13) (4).png" alt=""><figcaption></figcaption></figure> |
| 112 | + |
| 113 | +### <mark style="color:yellow;">eLearn Junior Penetration Tester (eJPT)</mark> |
| 114 | + |
| 115 | +<figure><img src=".gitbook/assets/image (2) (6) (1).png" alt=""><figcaption></figcaption></figure> |
| 116 | + |
| 117 | +## GitHub |
| 118 | + |
| 119 | +{% embed url="https://github.com/0xXyc" %} |
| 120 | + |
| 121 | +## Jumping straight into it: |
0 commit comments