Security, Reverse Engineering, Cloud and Code

Resources

Where to start…

Getting started of security whether it be pen testing, DFIR, reverse engineering, etc can be a little overwhelming. The good news is that there is a lot of resources out there and the community is very helpful. Depending on what you are trying to learn, there is some resources below to help you get started. I would recommend trying to stick to one thing at first and once you get some experience and gain some confidence then go ahead and branch out to other things.

In the beginning it might be useful to play around with a few different concepts and tools and once you find something that really grasps your interest, dig deeper into and try to master it. YouTube is your friend, the community shares a lot of stuff and there is a lot of good tutorials and information.

Things I recommend before you begin…

I highly recommend that you get started with some basic knowledge of networks and learn how to do some programming, especially in a scripting language. I highly recommend Python, because it is highly supported and a very powerful tool that you can use to write scripts as well as a full application.

For reverse engineering I recommend you learn assembly before you attempt to reverse any software/malware. You can start with something simple like MIPS and do some assembly coding so you can get an idea of how it works. Writing things in C and then disassembling the code to see what it looks like in assembly is greatly beneficial, this can help you learn some of the C constructs.

Books & Reading

  • Software Engineering
  • Reverse Engineering / DFIR
    • Practical Malware Analysis
      • Must have in my opinion (and many others =) ) to get started in reverse engineering & malware analysis. If you can only get one book, this would be it for me.
    • The IDA Pro Book
      • Good reference guide for IDA Pro
    • Practical Reverse Engineering
    • Attacking Network Protocols
    • Windows Internals Part 1
      • Get a better understanding of Windows
    • Practical Binary Analysis
    • The Art of Memory Forensics
    • Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
    • https://beginners.re/
  • Exploit Dev
    • The Shellcoder’s Handbook: Discovering and Exploiting Security Holes
  • Pen Testing
    • Rtfm: Red Team Field Manual
    • Gray Hat Hacking
    • The Hacker Playbook series
    • Penetration Testing
    • The Web Application Hacker’s Handbook
    • Attacking Network Protocols
    • Windows Internals Part 1
      • Get a better understanding of Windows
    • Troubleshooting with the Windows Sysinternals Tools
      • Reference on how to get the most out of the Sysinternals suite
  • Cryptography
    • Serious Cryptography: A Practical Introduction to Modern Encryption
      (I suggest starting with this one)
    • Applied Cryptography: Protocols, Algorithms and Source Code in C
    • Cryptography Engineering: Design Principles and Practical Applications
  • https://pagedout.institute/

Tools

  • Software Engineering
    • VIM =)
    • Visual Studio Code
      • Extensions
        • Better Comments
        • Shell Launcher
          • Allows you to switch Shells (Super useful)
        • Bracket Pair Colorizer (very useful)
        • Indenticator
        • indent-rainbow
        • Bookmarks
        • Todo Tree
      • Language Extensions
        • C/C++ – Microsoft
        • C# – Microsoft
        • PowerShell – Microsoft
        • Python – Microsoft
        • x86 and x64 Assembly
      • Themes
        • Noctis
        • Material
        • Monokai Pro
        • Cobalt2
        • Dracula
        • Night Owl
        • Rainglow
    • Visual Studio IDE
    • Atom
    • Sublime Text
  • General
    • VMWare Workstation Pro
    • VirtualBox
      • Virtual Machine
      • FREE
      • Snapshots!
    • WSL – Windows Subsystem for Linux
      • Super useful when doing command line stuff on windows without having to fire up a VM
    • PowerShell
      • Learn to use it, very powerful
    • Linux
      • Choose your flavor and learn to use it well
    • Cygwin
    • VirusTotal
      • Not too sure if that file you downloaded is safe? Upload it to VirusTotal!
  • Python Useful Modules
    • Scapy
    • RE
    • Socket
    • Scrapy
  • Reverse Engineering
  • DFIR
    • Volatility
    • SIFT Workstation
  • Penetration Testing
    • Metasploit
    • Nmap
    • Nessus
    • Hashcat
  • Web Penetration Testing
    • Burp Suite
    • Firefox plugins:
      • FoxyProxy
      • Wappalyzer or BuiltWith
    • DirBuster
      • Enumerates directories/paths/subpaths in a given domain
    • Sublist3r
      • Uses OSINT from search engines to help enumerate subdomains
    • Knockpy
      • Enumerate subdomains using a provided word list
    • Striker
      • Cloudflare bypass
      • DNS Enum
      • Checks for WordPress use
      • And more
  • Fuzzing
  • Security Tools for All

Hardware Tools

Reference

Blogs / Websites

Mix

Reverse Engineering

Microsoft / Windows

DFIR

Podcasts

  • Risky Business
  • Security Now
  • Security Weekly
  • Darknet Diaries
  • BHIS Podcast
  • TrustedSec Podcast

Conferences

  • DEFCON
  • Black Hat
  • BSides
  • S4
  • INFILTRATE

Training

ICS

https://www.smartgrid.gov/files/National_SCADA_Test_Bed_Handson_Control_System_Cyber_Securit_200911.pdf

https://github.com/Ka0sKl0wN/ICS-Security-Study-Resources

Certifications Prep

GIAC

Building an Index:

Hacking, Code & Coffee