med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

359
active users

#windowsinternals

0 posts0 participants0 posts today
Max Renke<p>Day 1 of posting to social media until I get an offensive security research job</p><p>First, I’m going to start with what I know – Windows. I need to recreate what I had access to at Microsoft, so that starts by setting up a dev environment and finding a copy of Windows System Internals, perhaps the greatest resource for learning Windows out there. My expertise is in Windows and virtualization, so I’m going to make sure I master those areas.</p><p>Next, I don’t think I want to grind coding exercises, but I do need to shake the rust off my coding skills. I think I’m going to start with some HackTheBox challenges and find some CTFs to participate in.<br> <br>Finally, my long overdue goal: learn Rust. I’m not sure if this will help immediately, as I could choose to improve my knowledge of Python. But Rust was getting more and more popular in the areas of Windows I was tasked with protecting, so I need to learn what all the fuss is about with regards to memory safety.<br> <br>If anyone is on a similar journey, let’s hold each other accountable in the comments! I will be sure to document any write-ups at blog.maxrenke.com (work in progress).</p><p><a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/WindowsInternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsInternals</span></a> <a href="https://infosec.exchange/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/PythonProgramming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PythonProgramming</span></a> <a href="https://infosec.exchange/tags/DevEnvironment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevEnvironment</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberCareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCareer</span></a> <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearch</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/CyberCommunity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCommunity</span></a> <a href="https://infosec.exchange/tags/JobSearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JobSearch</span></a> <a href="https://infosec.exchange/tags/TechJourney" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechJourney</span></a> <a href="https://infosec.exchange/tags/SecurityEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityEngineering</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/LearningEveryDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LearningEveryDay</span></a></p>
pill.<p>Does anyone have recommendation to learn about <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowsinternals</span></a> ?</p>
Graham Sutherland / Polynomial<p>I wrote a thing for work! Microsoft are introducing a new type confusion bug class mitigation called CastGuard, as part of the MSVC++ compiler.</p><p>Right now it's still undocumented &amp; unreleased. I stumbled across it by accident while looking at the Load Configuration directory in PE files, and ended up going down a deep rabbit hole of reverse engineering the entire feature and discovering all the hidden compiler flags and language keywords</p><p><a href="https://labs.nettitude.com/blog/preventing-type-confusion-with-castguard/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">labs.nettitude.com/blog/preven</span><span class="invisible">ting-type-confusion-with-castguard/</span></a></p><p><a href="https://chaos.social/tags/cpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cpp</span></a> <a href="https://chaos.social/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowsinternals</span></a> <a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
log4jm<p>Some of my holiday presents to start my 2023 <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a> reading list:</p><p>1) "Tracers in the Dark" by <span class="h-card"><a href="https://infosec.exchange/@agreenberg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>agreenberg</span></a></span> who along with <span class="h-card"><a href="https://infosec.exchange/@kimzetter" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kimzetter</span></a></span> and <span class="h-card"><a href="https://infosec.exchange/@NicoleP" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>NicoleP</span></a></span> is in my top 3 favorite writers in cyber</p><p>2) "The Art of Attack" by Maxie Reynolds</p><p>3) "The Art of Cyberwarfare" by Jon DiMaggio</p><p>all sitting atop my laptop, which is filled with eBooks I've bought over the last year. On there my goals for 2023 is to start/finish:</p><p>4) <a href="https://infosec.exchange/tags/WindowsInternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsInternals</span></a> 🤓</p><p>5) the incredible <span class="h-card"><a href="https://infosec.exchange/@alyssam_infosec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alyssam_infosec</span></a></span>'s "Cybersecurity Career Guide", which is actually where I'm going to start since I've got interviews for an InfoSec role in 2 weeks.</p><p>What are you reading in 2023? <a href="https://infosec.exchange/tags/HappyNewYear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HappyNewYear</span></a></p>