Hello and welcome! I joined the Lemmy fediverse a week ago, and settled in to the sh.itjust.works instance yesterday. I had pulled back from most of my social and general use of Reddit a few years back, and mostly just used it as a more social RSS feed to keep abreast of things going on in the cybersecurity and information security world. One of the first things I noticed when exploring the Lemmy Fediverse was that outside of the general tech communities, there was only a single cybersecurity community which hadn’t seen any activity in over a year or more.

I’ve gone back to my old stalwart RSS feeds, so I decided to create this community and post any articles I find interesting that come across my feed. Hopefully others will find it helpful as well!

I really hope that the social aspect of the community will take hold here too, and encourage anyone to make any link or text posts related to cybersecurity that they want. I don’t really want this to turn into a place where every other question is “How do I get into cybersecurity?” or “Will you be my mentor?”, but the Lemmy community is small so at this point I’d welcome any sort of community interaction.

To kick things off with a little about myself, started my career working as a network engineer for a WISP, scampering across city roofs, throwing up non-pen mounts for PtP radios, and slinging multi-Gbps links from building to building. I slowly transitioned into a SOC through a few calculated job transitions, then after a few more I’ve found myself working on a team that splits our time providing penetration tests for internal business lines and running red team/adversary emulation engagements against my company. Over the past few years I’ve earned my OSCP, OSEP, and OSWE, along with a handful of GIAC certifications. I’m currently working on the study materials for the OSED. I don’t have any coding experience, just a bit of scripting ability, but I am very excited to jump in to binary exploitation and reverse engineering. It’s the closest thing to magic to me in this space, and I can’t wait to deconstruct and demystify it a bit.

Thanks for reading, and glad you’re here!

  • computerboss@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    2 years ago

    Thank you for making this community. I enjoy keeping up with interesting attacks on r/cybersecurity so I was glad to see a similar one pop up on lemmy.

    I am a 3rd year CS student and I am running my schools cyber security club. I am studying for the OSCP over the summer and working on setting up a server stack for the club. I haven’t made many posts in the past but I am trying to engage more with the community.

    I am excited to see what this community brings in the future!

  • quizno50@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 years ago

    I had a section in university on binary exploitation. It was super fun. We got to do some buffer overflow attacks, dynamic linker exploits, and command injection. Reverse engineering is super frustrating for me, but very rewarding when you finally get it figured out. I admire those who can do it well.

    • borari@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      I’ve messed with binary exploitation a bit, just to the level of basic buffer overflows that the PEN-200/OSCP go in to. That exposure piqued my curiosity, but learning more lower-level stuff like using Windows APIs directly in C# with P/Invoke to do Process Injection/Migration and AV evasion really fueled my desire to keep digging until I hit I point where things are just too advanced for me to understand.

      Reverse engineering is super frustrating for me, but very rewarding when you finally get it figured out.

      Yeah, that dopamine hit when you finally figure out the thing you’re struggling with is what hooked me, and it hooked me hard.

  • robsan05@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    2 years ago

    Hi all, current IT Support Specialist, new to Lemmy and currently Studying for the Security+. Goal of breaking into CyberSecurity as a SOC Analyst.