<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Intro to Cybersecurity on quixel200</title><link>http://mycatpets.me/notes/intro_to_cybersecurity/</link><description>Recent content in Intro to Cybersecurity on quixel200</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 19 Aug 2025 08:51:29 +0530</lastBuildDate><atom:link href="http://mycatpets.me/notes/intro_to_cybersecurity/index.xml" rel="self" type="application/rss+xml"/><item><title>Integrated Security</title><link>http://mycatpets.me/notes/intro_to_cybersecurity/integrated_security/</link><pubDate>Tue, 19 Aug 2025 08:51:29 +0530</pubDate><guid>http://mycatpets.me/notes/intro_to_cybersecurity/integrated_security/</guid><description>&lt;p>These challenges build upon everything you learned so far, you&amp;rsquo;re almost there!&lt;/p>
&lt;p>There will be very little or nothing new to learn here, you need to combine previously learned concepts.&lt;/p>
&lt;ul>
&lt;li>Some of these challenges took me close to a week to complete, you will eventually get it!&lt;/li>
&lt;/ul>
&lt;h2 id="some-tips-for-secure-chat">Some tips for secure chat&lt;/h2>
&lt;ul>
&lt;li>
&lt;p>Read the server code, it doesn&amp;rsquo;t change much from 1-5 and it will help you a lot. (When I say read I mean understand each and every line)&lt;/p></description></item><item><title>Binary Exploitation</title><link>http://mycatpets.me/notes/intro_to_cybersecurity/binary_exploitation/</link><pubDate>Tue, 19 Aug 2025 08:39:39 +0530</pubDate><guid>http://mycatpets.me/notes/intro_to_cybersecurity/binary_exploitation/</guid><description>&lt;p>When exploiting these challenges, I highly recommend using &lt;code>gdb&lt;/code> to save you some time.&lt;/p>
&lt;h2 id="in-pwntools">in pwntools&lt;/h2>
&lt;p>debugging will only work with with a multiplexer like &lt;code>tmux&lt;/code>(covered in the linux module)&lt;/p>
&lt;p>The difference between these is important&lt;/p>
&lt;p>Start a process with the debugger(&lt;strong>This will drop privileges&lt;/strong>)&lt;/p>
&lt;pre tabindex="0">&lt;code>p = gdb.debug(&amp;#34;process&amp;#34;)
&lt;/code>&lt;/pre>&lt;p>Start the process and then attach a debugger(&lt;strong>this will not work if its a setuid binary&lt;/strong>)&lt;/p>
&lt;pre tabindex="0">&lt;code>p = process(&amp;#34;process&amp;#34;)
gdb.attach(p)
&lt;/code>&lt;/pre>&lt;h2 id="debugging-shellcode">Debugging shellcode&lt;/h2>
&lt;p>If your shellcode doesn&amp;rsquo;t work for some reason, add an int3 instruction to the beginning of your shellcode (&lt;code>\xcc&lt;/code>). When run with a debugger it will automatically break at that point.&lt;/p></description></item><item><title>Reverse Engineering</title><link>http://mycatpets.me/notes/intro_to_cybersecurity/reverse_engineering/</link><pubDate>Tue, 19 Aug 2025 08:32:55 +0530</pubDate><guid>http://mycatpets.me/notes/intro_to_cybersecurity/reverse_engineering/</guid><description>&lt;p>Now would be a great time to learn to use &lt;code>ghidra&lt;/code>,&lt;code>ida&lt;/code>,&lt;code>radare2&lt;/code> or &lt;code>binary ninja&lt;/code>. Also python scripting will come in real handy.&lt;/p>
&lt;ul>
&lt;li>Do not waste your time trying to read the nested arrays or structs in the pseudo code section of ghidra(you&amp;rsquo;re welcome to try), it is much better to read the disassembly.&lt;/li>
&lt;li>some disassemblers might decompile things better than others, for example I have seen Ida automatically find main in stripped binaries unlike Ghidra.&lt;/li>
&lt;li>If static analysis gets too hard, just give the program input and see what goes wrong!, maybe even use something like gdb and set breakpoints.&lt;/li>
&lt;/ul>
&lt;p>There will be some challenges with a &lt;strong>massive spike in difficulty&lt;/strong>, don&amp;rsquo;t give up you&amp;rsquo;ll eventually get it.&lt;/p></description></item><item><title>Access Control</title><link>http://mycatpets.me/notes/intro_to_cybersecurity/access_control/</link><pubDate>Tue, 19 Aug 2025 08:30:43 +0530</pubDate><guid>http://mycatpets.me/notes/intro_to_cybersecurity/access_control/</guid><description>&lt;p>Do you really want a guide for this? :(&lt;/p>
&lt;p>You might want to script the last 2 levels using &lt;code>pwntools&lt;/code> (there&amp;rsquo;s a community dojo for that)&lt;/p></description></item><item><title>Cryptography</title><link>http://mycatpets.me/notes/intro_to_cybersecurity/cryptography/</link><pubDate>Mon, 18 Aug 2025 16:27:37 +0530</pubDate><guid>http://mycatpets.me/notes/intro_to_cybersecurity/cryptography/</guid><description>&lt;p>After scouring through the internet for many hours, I have come to the conclusion that the material provided on the module is sufficient.&lt;/p>
&lt;p>Here&amp;rsquo;s a video on how to approach the POA challenges that&amp;rsquo;s on the discord server:&lt;/p>
&lt;p>&lt;a href="https://discord.com/channels/750635557666816031/968683579649437696/1400392548832514149">here&lt;/a>&lt;/p></description></item><item><title>Intercepting_communication</title><link>http://mycatpets.me/notes/intro_to_cybersecurity/intercepting_communication/</link><pubDate>Mon, 18 Aug 2025 16:13:30 +0530</pubDate><guid>http://mycatpets.me/notes/intro_to_cybersecurity/intercepting_communication/</guid><description>&lt;h1 id="denial-of-service">Denial of Service&lt;/h1>
&lt;p>Be patient&amp;hellip; you need to find the right balance where you overwhelm the server but not your machine.&lt;/p>
&lt;ul>
&lt;li>Sometimes your flag might get lose in errors so either save the output to a log or grep it directly.&lt;/li>
&lt;/ul>
&lt;h1 id="the-rest-of-the-challenges">The rest of the challenges&lt;/h1>
&lt;p>After these challenges, you need to craft raw packets using &lt;code>scapy&lt;/code>. The documentation is linked in the module.
&lt;a href="https://portswigger.net/web-security/file-path-traversal">Check out portswigger&lt;/a>&lt;/p></description></item><item><title>Web Security</title><link>http://mycatpets.me/notes/intro_to_cybersecurity/web_security/</link><pubDate>Mon, 18 Aug 2025 16:00:25 +0530</pubDate><guid>http://mycatpets.me/notes/intro_to_cybersecurity/web_security/</guid><description>&lt;h1 id="path-traversal">Path Traversal&lt;/h1>
&lt;ul>
&lt;li>The description is more than enough to solve these. This might seem very simple but it &lt;a href="https://hackernoon.com/a-deep-dive-into-path-traversal-vulnerabilities">happens more often than you think&lt;/a>&lt;/li>
&lt;li>&lt;strong>curl hates relative paths&lt;/strong>, it will resolve paths automatically, read the man pages to know more.I would recommend using python for testing.&lt;/li>
&lt;/ul>
&lt;h1 id="command-injection">Command Injection&lt;/h1>
&lt;ul>
&lt;li>The only hint for level 6:
Think of &lt;em>every&lt;/em> character you can use. Think about how you run multiple commands in your terminal or in a bash script&lt;/li>
&lt;/ul>
&lt;h1 id="sql-injection">SQL injection&lt;/h1>
&lt;ul>
&lt;li>If you understand how SQL injection works, you&amp;rsquo;ll breeze through these, if not, watch the lecture video again&lt;/li>
&lt;/ul>
&lt;h1 id="xss">XSS&lt;/h1>
&lt;p>Before trying anything, cat the source code and understand what it&amp;rsquo;s doing.&lt;/p></description></item></channel></rss>