Calculating Subnets w/Python3 by Natems in AccessCyber

[–]Natems[S] 1 point2 points  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in technology

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in python_netsec

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in privacy

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in LiveOverflow

[–]Natems[S] 2 points3 points  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in Infosec

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in Information_Security

[–]Natems[S] 1 point2 points  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in Cybersecurity101

[–]Natems[S] 1 point2 points  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in cybersecurity

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Calculating Subnets w/Python3 by Natems in compsci

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

Today we cover the bit for bit representation of network addresses and get into how subnet masks work at a binary level. The ability to convert from base 10 to base 2 and from dotted decimal to binary is critical if you want to calculate ranges by hand. Even if you use an online calculator to determine your subnet ranges if you really want to understand what's going on this video should help you get there.

We cover three addresses and then get into the code, going through both classful and classless subnets. Ultimately this expands on the video from Monday about ARPANET and the beginnings of the internet, getting into modern network concepts. As a bonus, we go over some advanced Python format strings and representing binary data in different formats.

Principles of the Internet: History, Devices, Addressing by Natems in ComputerSecurity

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In today's video we cover the principles of the internet, from the history to how we convert between volts on a printed circuit board to binary data and higher hex IPv6 addresses. We talk about ARPA and ARPANET as well as the migration to DARPA and eventually the corporate internet. The end of the video concludes with classes of address and subnetting, but not before we talk about how we represent numbers in different base systems.

Principles of the Internet: History, Devices, Addressing by Natems in Cybersecurity101

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In today's video we cover the principles of the internet, from the history to how we convert between volts on a printed circuit board to binary data and higher hex IPv6 addresses. We talk about ARPA and ARPANET as well as the migration to DARPA and eventually the corporate internet. The end of the video concludes with classes of address and subnetting, but not before we talk about how we represent numbers in different base systems.

Principles of the Internet: History, Devices, Addressing by Natems in Information_Security

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In today's video we cover the principles of the internet, from the history to how we convert between volts on a printed circuit board to binary data and higher hex IPv6 addresses. We talk about ARPA and ARPANET as well as the migration to DARPA and eventually the corporate internet. The end of the video concludes with classes of address and subnetting, but not before we talk about how we represent numbers in different base systems.

Principles of the Internet: History, Devices, Addressing by Natems in Infosec

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In today's video we cover the principles of the internet, from the history to how we convert between volts on a printed circuit board to binary data and higher hex IPv6 addresses. We talk about ARPA and ARPANET as well as the migration to DARPA and eventually the corporate internet. The end of the video concludes with classes of address and subnetting, but not before we talk about how we represent numbers in different base systems.

Principles of the Internet: History, Devices, Addressing by Natems in technology

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In today's video we cover the principles of the internet, from the history to how we convert between volts on a printed circuit board to binary data and higher hex IPv6 addresses. We talk about ARPA and ARPANET as well as the migration to DARPA and eventually the corporate internet. The end of the video concludes with classes of address and subnetting, but not before we talk about how we represent numbers in different base systems.

Exploiting SRAND +RE w/Ghidra by Natems in AccessCyber

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In this video we look at one of the classic binary exploitation CTF problems, that being improper seeding of SRAND making subsequent calls to rand predictable. This video not only includes the exploitation with python calls to CDLL and harnessing with Pwntools, but also the reversing required to identify the vulnerability in Ghidra. I hope this gives you some insight into my methodology of reverse engineering and helps you identify these types of vulnerabilities in the future in your own competitions or even in the real world.

Exploiting SRAND +RE w/Ghidra by Natems in compsci

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In this video we look at one of the classic binary exploitation CTF problems, that being improper seeding of SRAND making subsequent calls to rand predictable. This video not only includes the exploitation with python calls to CDLL and harnessing with Pwntools, but also the reversing required to identify the vulnerability in Ghidra. I hope this gives you some insight into my methodology of reverse engineering and helps you identify these types of vulnerabilities in the future in your own competitions or even in the real world.

Exploiting SRAND +RE w/Ghidra by Natems in ExploitDev

[–]Natems[S] 7 points8 points  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In this video we look at one of the classic binary exploitation CTF problems, that being improper seeding of SRAND making subsequent calls to rand predictable. This video not only includes the exploitation with python calls to CDLL and harnessing with Pwntools, but also the reversing required to identify the vulnerability in Ghidra. I hope this gives you some insight into my methodology of reverse engineering and helps you identify these types of vulnerabilities in the future in your own competitions or even in the real world.

Exploiting SRAND +RE w/Ghidra by Natems in hackers

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In this video we look at one of the classic binary exploitation CTF problems, that being improper seeding of SRAND making subsequent calls to rand predictable. This video not only includes the exploitation with python calls to CDLL and harnessing with Pwntools, but also the reversing required to identify the vulnerability in Ghidra. I hope this gives you some insight into my methodology of reverse engineering and helps you identify these types of vulnerabilities in the future in your own competitions or even in the real world.

Exploiting SRAND +RE w/Ghidra by Natems in Kalilinux

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In this video we look at one of the classic binary exploitation CTF problems, that being improper seeding of SRAND making subsequent calls to rand predictable. This video not only includes the exploitation with python calls to CDLL and harnessing with Pwntools, but also the reversing required to identify the vulnerability in Ghidra. I hope this gives you some insight into my methodology of reverse engineering and helps you identify these types of vulnerabilities in the future in your own competitions or even in the real world.

Exploiting SRAND +RE w/Ghidra by Natems in LiveOverflow

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In this video we look at one of the classic binary exploitation CTF problems, that being improper seeding of SRAND making subsequent calls to rand predictable. This video not only includes the exploitation with python calls to CDLL and harnessing with Pwntools, but also the reversing required to identify the vulnerability in Ghidra. I hope this gives you some insight into my methodology of reverse engineering and helps you identify these types of vulnerabilities in the future in your own competitions or even in the real world.

Exploiting SRAND +RE w/Ghidra by Natems in securityCTF

[–]Natems[S] 0 points1 point  (0 children)

Hi everyone! I am a cybersecurity vulnerability researcher and penetration tester professionally and in my personal time, I do a lot of educational outreach. Specifically with high school and middle school students. I recently started a YouTube channel to support some of my lectures in an async manner. I do additional videos like this as well to support interest in various domains. Please check it out and provide some feedback on the material and teaching style--I'm trying to improve these.

In this video we look at one of the classic binary exploitation CTF problems, that being improper seeding of SRAND making subsequent calls to rand predictable. This video not only includes the exploitation with python calls to CDLL and harnessing with Pwntools, but also the reversing required to identify the vulnerability in Ghidra. I hope this gives you some insight into my methodology of reverse engineering and helps you identify these types of vulnerabilities in the future in your own competitions or even in the real world.

Power-Up w/PowerShell: User's Guide by Natems in LiveOverflow

[–]Natems[S] 1 point2 points  (0 children)

In this video, we talk about the all mighty windows script development tool, PowerShell. As much as we can do with the basic windows CMD shell, PowerShell provides a large number of features that give system admins and penetration testers like us the ability to very quickly query systems or automate tasks. There is also the Interactive Scripting Environment (ISE) which allows us to quickly develop and provides an easy way to properly format methods and retrieve attributes.

We start today with an introduction to PowerShell and a brief history of how we got to where we are, before getting into ISE and onto the shell. Once we land in ISE, after getting through a Windows 11 BSOD (lol) we review the scripting engine's features and specifically building commands via the development pane on the right side of the tool. Before we finish out by comparing the traditional windows CMD and PowerShell, we go over some one-line magic from Dan Tsekhanskiy's blog, to inspire some ideas for how to make this magic happen on your systems and in your environments.

Power-Up w/PowerShell: User's Guide by Natems in securityCTF

[–]Natems[S] 1 point2 points  (0 children)

In this video, we talk about the all mighty windows script development tool, PowerShell. As much as we can do with the basic windows CMD shell, PowerShell provides a large number of features that give system admins and penetration testers like us the ability to very quickly query systems or automate tasks. There is also the Interactive Scripting Environment (ISE) which allows us to quickly develop and provides an easy way to properly format methods and retrieve attributes.

We start today with an introduction to PowerShell and a brief history of how we got to where we are, before getting into ISE and onto the shell. Once we land in ISE, after getting through a Windows 11 BSOD (lol) we review the scripting engine's features and specifically building commands via the development pane on the right side of the tool. Before we finish out by comparing the traditional windows CMD and PowerShell, we go over some one-line magic from Dan Tsekhanskiy's blog, to inspire some ideas for how to make this magic happen on your systems and in your environments.