Monday, March 3, 2025

Cybersecurity Journal: March 3rd, 2025

 

  • I worked on my malware analysis project for the malware file, "f.exe". I am almost done. When it is complete, I will post the walkthrough here. I want to go through the Regshot output and analyze it more. Also, I want to find the MITRE ATT&CKK for the malware and write a short summary at the end. 




  • I read Cyber Security First Principles (Howard). I am learning a lot from it. According to Howard, the first principle is “reduce the probability of material impact from a cyber event over a certain period of time”. Then I read the second chapter that talked about strategies. The strategies that come from the first principle are zero trust, the intrusion kill chain, resilience, risk forecasting, and automation. This book is like the cyber security bible and provides a foundational structure for all cyber security professionals to follow. I will make more posts about this book in the future.




  • Then I watched a YouTube lecture about web application pen testing. I want to get a strong foundational knowledge of web applications and how to pen test them, so that I can pursue bug bounty in the future. I want to be able to do freelance remote work in the field of cyber security. Web app pen testing and bug bounty are some of the best avenues to achieve that.  





No comments:

Post a Comment

Help Desk Lab // Part 7-9 // (Mapping Network Drives, Active Directory security groups, NTFS/share-level permissions, Remote Desktop/Remote Registry, Group Policy, RSOP)

 *All credit for this lab goes to Simokid on GitHub. This is my walkthrough.    Security Groups, Mapped Drives, Personal Drives, Permission ...