#100daysofcybersecurity — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #100daysofcybersecurity, aggregated by home.social.
-
Hello again! :ablobcatnodfast:
Today, I reviewed Linux Terminal commands, Command Prompt commands, and finally, PowerShell. Understanding Powershell was extremely useful because I have had less exposure to it than to Terminal and CMD.
After reviewing the CLI material, I moved on to networking concepts with practical use cases. This will greatly boost my learning.
Lastly, I worked on a DNA problem set in the Python section of the CS50 course. I'm working with CSV files and trying to create a program that performs DNA profiling.
-
SEC0 from @RealTryHackMe done.
I know it’s a fundamental's certification, but I treated it like it wasn’t. Went back over weak areas. I completed the exam.
Next step: SEC1.
-
SEC0 from @RealTryHackMe done.
I know it’s a fundamental's certification, but I treated it like it wasn’t. Went back over weak areas. I completed the exam.
Next step: SEC1.
-
Hello, again :ablobcatnodfast:
Today is officially the worst day of this month, no electricity whole day, I wasn't able to get much done, I did do a little bit of packet analysis.
I can confidently identify common nmap scans. It all boils down to the TCP three way handshake for the TCP connect scan, and Stealth scan.
UDP scan utilizes the icmp protocol to scan the open ports.
-
Hello, again :ablobcatnodfast:
Today is a special day because two great things happened to me. First, I reached the top one percent of @RealTryHackMe. That was one of my goals for this year, so congratulations to me! Now, I have set my sights higher. I want to reach the top one thousand rank on TryHackMe.
Something extraordinary happened today. I was in the GingerHacker Initiative Discord community chatting with the founder. Since I spent my savings on the TryHackMe premium annual subscription, I told him how I'm preparing for SEC1 because it's practical and more affordable than Security+. He immediately offered to sponsor my certification to help me progress in my career. He decided to sponsor both SEC0 and SEC1. Shout out to the #GingerHacker!
It was a crazy and wonderful day! Also, I submitted the speller problem, and now I'm moving to week six.
Python rocks! 💪
-
Hello, again :ablobcatnodfast:
Today is a special day because two great things happened to me. First, I reached the top one percent of @RealTryHackMe. That was one of my goals for this year, so congratulations to me! Now, I have set my sights higher. I want to reach the top one thousand rank on TryHackMe.
Something extraordinary happened today. I was in the GingerHacker Initiative Discord community chatting with the founder. Since I spent my savings on the TryHackMe premium annual subscription, I told him how I'm preparing for SEC1 because it's practical and more affordable than Security+. He immediately offered to sponsor my certification to help me progress in my career. He decided to sponsor both SEC0 and SEC1. Shout out to the #GingerHacker!
It was a crazy and wonderful day! Also, I submitted the speller problem, and now I'm moving to week six.
Python rocks! 💪
-
Hello, again :ablobcatnodfast:
Today, I started working through the network analysis rooms on TryHackMe. I used Wireshark to analyze PCAP files, which went smoothly since I have experience with it. However, I learned how to use statistics more effectively.
Lastly, I found a way to reduce collisions using a better hashing function. Instead of using just the first character to build the hash table, I multiplied the characters to increase entropy. I'm only six seconds behind the staff algorithm.
I also found a way to handle the apostrophe. Since I subtract 65 from the characters, the result is negative, which leads to a segmentation fault. I simply used a conditional statement to handle it.
-
Hello, again :ablobcatnodfast:
Today, I started working through the network analysis rooms on TryHackMe. I used Wireshark to analyze PCAP files, which went smoothly since I have experience with it. However, I learned how to use statistics more effectively.
Lastly, I found a way to reduce collisions using a better hashing function. Instead of using just the first character to build the hash table, I multiplied the characters to increase entropy. I'm only six seconds behind the staff algorithm.
I also found a way to handle the apostrophe. Since I subtract 65 from the characters, the result is negative, which leads to a segmentation fault. I simply used a conditional statement to handle it.
-
Hello, again :ablobcatnodfast:
Today, I started working through the network analysis rooms on TryHackMe. I used Wireshark to analyze PCAP files, which went smoothly since I have experience with it. However, I learned how to use statistics more effectively.
Lastly, I found a way to reduce collisions using a better hashing function. Instead of using just the first character to build the hash table, I multiplied the characters to increase entropy. I'm only six seconds behind the staff algorithm.
I also found a way to handle the apostrophe. Since I subtract 65 from the characters, the result is negative, which leads to a segmentation fault. I simply used a conditional statement to handle it.
-
Hello, again :ablobcatnodfast:
Today, I started working through the network analysis rooms on TryHackMe. I used Wireshark to analyze PCAP files, which went smoothly since I have experience with it. However, I learned how to use statistics more effectively.
Lastly, I found a way to reduce collisions using a better hashing function. Instead of using just the first character to build the hash table, I multiplied the characters to increase entropy. I'm only six seconds behind the staff algorithm.
I also found a way to handle the apostrophe. Since I subtract 65 from the characters, the result is negative, which leads to a segmentation fault. I simply used a conditional statement to handle it.
-
Hello, again :ablobcatnodfast:
Today, I started working through the network analysis rooms on TryHackMe. I used Wireshark to analyze PCAP files, which went smoothly since I have experience with it. However, I learned how to use statistics more effectively.
Lastly, I found a way to reduce collisions using a better hashing function. Instead of using just the first character to build the hash table, I multiplied the characters to increase entropy. I'm only six seconds behind the staff algorithm.
I also found a way to handle the apostrophe. Since I subtract 65 from the characters, the result is negative, which leads to a segmentation fault. I simply used a conditional statement to handle it.
-
Hello, again :ablobcatnodfast:
Today, I finished the remaining rooms in the Pre-Security Pathway. I reviewed programming concepts and the CIA triad, and I can finally focus on the network analysis rooms.
I also solved several interactive challenges involving the Caesar cipher to demonstrate symmetric encryption, and they were genuinely fun to work through.
Next, I was almost able to complete the speller code, but it still suffers from low performance because I have not yet improved the hash function, which I will work on tomorrow.
I am using a hash table with linked lists for collision handling. Currently, it takes O(n) time in practice due to poor distribution. Collisions are handled using chaining, where each bucket stores a linked list. However, I am only using 26 buckets, and the hash function returns a value based solely on the first character of the word. Each new node is prepended to the list.
As a result, lookups require linear traversal through long linked lists, which significantly impacts performance. Tomorrow, I will work on improving the hash function and compare the results.
-
Hello, again :ablobcatnodfast:
Today, I finished the remaining rooms in the Pre-Security Pathway. I reviewed programming concepts and the CIA triad, and I can finally focus on the network analysis rooms.
I also solved several interactive challenges involving the Caesar cipher to demonstrate symmetric encryption, and they were genuinely fun to work through.
Next, I was almost able to complete the speller code, but it still suffers from low performance because I have not yet improved the hash function, which I will work on tomorrow.
I am using a hash table with linked lists for collision handling. Currently, it takes O(n) time in practice due to poor distribution. Collisions are handled using chaining, where each bucket stores a linked list. However, I am only using 26 buckets, and the hash function returns a value based solely on the first character of the word. Each new node is prepended to the list.
As a result, lookups require linear traversal through long linked lists, which significantly impacts performance. Tomorrow, I will work on improving the hash function and compare the results.
-
Hello, again :ablobcatnodfast:
TryHackMe recently introduced new rooms to their pre-security pathway, and I went through some of them today. The rooms mostly focus on operating systems, hardware, and basics, which I'm already familiar with, so I finished most of them. I'll work on the rest tomorrow so I can continue the SOC L1 pathway. Lastly, I achieved a milestone: I was not only able to create linked lists in C, but also visualize how I was using the pointers and how the chain of nodes was being stitched together perfectly while working on the speller problem from CS50.
-
Hello, again :ablobcatnodfast:
TryHackMe recently introduced new rooms to their pre-security pathway, and I went through some of them today. The rooms mostly focus on operating systems, hardware, and basics, which I'm already familiar with, so I finished most of them. I'll work on the rest tomorrow so I can continue the SOC L1 pathway. Lastly, I achieved a milestone: I was not only able to create linked lists in C, but also visualize how I was using the pointers and how the chain of nodes was being stitched together perfectly while working on the speller problem from CS50.
-
Hello, again :ablobcatnodfast:
On weekends, I focus on practicing what I learned during the week. Today, I worked on level 26 of Bandit from OverTheWire.org. It was a doozy level. I didn't know that changing the terminal size could affect the more utility, but I finally found a way to access vim from more. Then, I was able to get a shell.
-
Hello, again :ablobcatnodfast:
On weekends, I focus on practicing what I learned during the week. Today, I worked on level 26 of Bandit from OverTheWire.org. It was a doozy level. I didn't know that changing the terminal size could affect the more utility, but I finally found a way to access vim from more. Then, I was able to get a shell.
-
Hello, people :ablobcatpoprev:
Before I share what I learned today, I would like to explain something. I had been using Twitter to post my progress, but the user experience and overall vibe had seriously degraded to the point that I didn't want to post my progress there anymore.
Thankfully, I have an account here, so I'm going to share my progress here instead.
Today, I went through the new rooms in the pre-security pathway on @RealTryHackMe. Since I have already studied the basics of computers and am comfortable with Linux Terminal, Powershell, and Command Prompt, it was fun because of the interactive exercises.
-
Android Deep Link Issues And WebView Exploitation
🔗 https://8ksec.io/android-deeplink-and-webview-exploitation-8ksec-blogs/?noamp=available
#cybersecurity #Pentesting #Hacking #bugbountytips #infosec #CTF #pwn #cybersecuritytips #redteam #coding #100DaysOfHacking #vulnerabilities #BugBounty #Android #Deeplink #100DaysOfCyberSecurity #CyberSecurityAwareness
-
Collection of some OSINT tools 🔎
🔗 https://github.com/asharbinkhalil/intellitoolz
#cybersecurity #Pentesting #Hacking #bugbountytips #infosec #pwn #CTF #cybersecuritytips #redteam #coding #100DaysOfHacking #vulnerabilities #BugBounty #OSINT #Software #100DaysOfCyberSecurity #hardware #CyberSecurityAwareness
-
25 Recon Tools for Hacking & BugBounty 🔎
#cybersecurity #Pentesting #Hacking #bugbountytips #infosec #CTF #pwn #cybersecuritytips #redteam #coding #100DaysOfHacking #vulnerabilities #BugBounty #recon #enumeration #100DaysOfCyberSecurity #CyberSecurityAwareness
-
All about bug bounty 🔎
(bypasses, payloads, etc)
Link: https://github.com/daffainfo/AllAboutBugBounty
#cybersecurity #Pentesting #Hacking #bugbountytips #infosec #BugBounty #cybersecuritytips #redteam #coding #100DaysOfHacking #vulnerabilities #100DaysOfCyberSecurity #CTF #CyberSecurityAwareness #pwn
-
Account takeover via IDOR form JWT
Link: https://t.co/snsgTSfGHg
#cybersecurity #Pentesting #Hacking #bugbountytips #infosec #CTF #cybersecuritytips #redteam #coding #100DaysOfHacking #vulnerabilities #BugBounty #JWT #IDOR #pwn #100DaysOfCyberSecurity #CyberSecurityAwareness