Posts

Showing posts from 2021

HackerBoxes: StarterWorkshop - Solderless Breadboard

Image
HackerBoxes was introduced to me by another student in my Python class. I purchased this box months ago. Now that I am on break I have a little more time to work on it. The instructions start off with familiarizing us with what's in the box. This box comes with a ton of starter materials; everything you need to complete several beginner projects. The instructions fort this can be found here:  https://www.instructables.com/HackerBoxes-Starter-Workshop/ This box has us starting off with creating a simple circuit using a breadboard. Breadboards are frequently used to teach people about circuits. This is my first time ever working with a breadboard and properly learning about circuits.  We were provided with a breadboard and a breadboard power supply module that can be powered using a micro USB cable (Figure 1).  Figure 1 Once we plug in our power supply to the breadboard, we set both 3.3V/5V jumpers (Figure 2) over to 5V per the instructions.  Figure 2 Now, we can start building our

TryHackMe: Advent of Cyber 3

Image
Merry Christmas and Happy Holidays!  We made it. We helped elf McSkidy undo the Grinch's malicious activities.     THE STORY:      I am so happy I could participate in this year's Advent of Cyber as it was happening. I joined TryHackMe this year at the beginning of January. TryHackMe gave me a jump start on some of the material I was about to learn in class. Since joining, I have made it to the top 1% of users on the site. I still have a long way to go and so much more to learn. I am constantly recommending this site to my peers.    Other than a couple of days during finals week, I was able to keep on track with the daily challenges. My favorite challenges were the Blue Teaming challenges on Days 19 through Day 23. These challenges involved investigating a phishing attempt, identifying file types, finding strings, calculating hashes, and using Virus total to perform a preliminary analysis of a suspicious file. We also created Yara rules and analyzed Windows event logs to recov

MemLabs: Lab 0

Image
My first post. I have to start somewhere, so I decided to just post what I have been working on the past two days. Volatility. I came across MemLabs yesterday and wanted to dive in. I am somewhat familiar with Volatility after completing the Volatility room in TryHackMe, but I wanted to gain some some more hands-on experience.  For those not familiar with Volatility: "The Volatility Framework is a completely open collection of tools for the extraction of digital artifacts from volatile memory (RAM) samples. It is useful in forensics analysis. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system" (manpages.ubuntu.com). From the MemLabs github: MemLabs is an educational, introductory set of CTF-styled challenges which is aimed to encourage students, security researchers and also CTF players to get started with the field of Memory Forens