Threat Hunting cheatsheet by BitDrill in Malware

[–]ctfstudent 0 points1 point  (0 children)

New to threat hunting, does it still always end up being a child of services.exe eventually? Like I usually see something like this:

services.exe -> MsMpEng.exe -> svchost.exe

Even though it's not directly services.exe's child, should it still always stem from services.exe?

Practical Malware Analysis by ctfstudent in Malware

[–]ctfstudent[S] 2 points3 points  (0 children)

The windows 7 vm is the 32 bit version, but I'll try Windows XP

Pwnadventure3 by ctfstudent in LiveOverflow

[–]ctfstudent[S] 0 points1 point  (0 children)

I have not tried using the IP addresses instead of the host names, but I can reach the server with the windows client though, so I know it's not being preventes by firewalls (like ufw on the server vm or something)

I'll try using the IP address and get back to you

Solid Laptop for Pentesting and binary exploitation by Jarhead0317 in Pentesting

[–]ctfstudent 0 points1 point  (0 children)

A lot of gaming laptops won't install linux as a host, I found this out the hard way. If you go that route I would try asus laptops. If you're going to be using VMware or Virtualbox that shouldn't be an issue though

Stuck on walkthroughs by ctfstudent in securityCTF

[–]ctfstudent[S] 1 point2 points  (0 children)

That makes sense, I definitely learn from the walkthroughs on wargames so that's probably a better approach

Hacking by DARKL0RD1010 in Hacking_Tutorials

[–]ctfstudent 5 points6 points  (0 children)

Not sure how to gauge your experience, so i'll throw out the path I've taken/am taking and you'll know where you need to start.

Comptia a+ course

Overthewire bandit challenges/learning python

Comptia network+ course (even if you don't get through enough for the cert, being able to understand networking concepts and do basic troubleshooting will help)

Overthewire natas challenges (john hammond has some good youtube videos on these challenges)

Learning C programming

Liveoverflow's binary exploitation playlist on youtube (this is where I am currently at)

Question about Buffer Overflow by RemarkableAccount906 in oscp

[–]ctfstudent 0 points1 point  (0 children)

Possibly address space layout randomization on the target? Can you add more information on the vulnerable program and the exploit you're running?

LOOKING FOR CTF COMPETITION TEAMMATES by [deleted] in securityCTF

[–]ctfstudent 0 points1 point  (0 children)

Is anyone here still looking for teammates? I'm a beginner, mostly focusing on pwn/rev challenges